Blog
Beyond compliance
Protect your customers, your company, and your future with better data security
When and why to trust SCIM, SSO JIT, and SSO Role Mapping
By Jean-Claude Kuo
If security and compliance concerns have blocked efforts to move your organization to the cloud, it’s time to reevaluate. Examine modern cloud security by looking into the user access management capabilities in the latest release of Talend in the cloud.
Read moreThe AI paradox & the importance of human-led automated intelligence
By Talend Team
The more we automate data analytics, the more work is required of humans to cover edge cases, provide high-level scrutiny, and put meaning behind the insights.
Read moreBalancing data sharing and compliance is hard - but it doesn't have to be
By Kensuke Ishii
Achieving data excellence doesn't have to be hard - here's how to balance sharing data while keeping compliant.
Read moreYou can trust us: we are HIPAA compliant
By Anne Hardy
Healthcare data is particularly sensitive. Your patients need to know their data is being kept secure and that they can trust you with their PHI.
Read moreFrom GDPR to CCPA, the right to data access is the Achilles’ Heel of data privacy compliance and customer trust – Part 1
By Talend Team
Data privacy is not only a matter of governance, risk, and compliance. The real challenge is to efficiently use customer data while protecting it.
Read moreTalend’s vault-based secrets revealed: Open-sourcing Vault Sidecar Injector
By Talend Team
The Vault Sidecar Injector component allows organizations to securely and continuously fetch and push secrets to applications as with Kubernetes Secrets.
Read moreData Privacy through shuffling and masking – Part 2
By Talend Team
Data Masking techniques is one of the best approaches to selectively share quality data across your organization while guaranteeing Data Privacy.
Read moreData Privacy through shuffling and masking – Part 1
By Talend Team
Selectively share quality data across your organization for development, analysis and more without exposing Personally Identifiable Information (PII).
Read more