Tagged articles
7 articles
Page 1 of 1
DataFunSummit
DataFunSummit
Sep 19, 2025 · Big Data

Unlocking Data Lineage: SQL Bloodline for Discovery, Governance & Protection

This article explains how SQL lineage (bloodline) technology can be leveraged in offline data warehouses to enable precise data discovery, automated tag propagation, fine‑grained data governance, column‑level TTL management, and dynamic masking for data protection, illustrating implementation steps, strategies, and real‑world use cases.

Data GovernanceDynamic MaskingSQL lineage
0 likes · 28 min read
Unlocking Data Lineage: SQL Bloodline for Discovery, Governance & Protection
Alibaba Cloud Big Data AI Platform
Alibaba Cloud Big Data AI Platform
Aug 1, 2025 · Information Security

How MaxCompute Revamped Enterprise Permissions for Secure Data Migration

This article details how a Southeast Asian tech giant migrated from Google BigQuery to Alibaba Cloud MaxCompute, redesigning its permission architecture with multi‑level access control, namespace‑based hierarchies, role inheritance, policy‑tag driven dynamic data masking, and cross‑account user management to meet strict security and compliance requirements.

Cross-AccountDynamic MaskingMaxCompute
0 likes · 21 min read
How MaxCompute Revamped Enterprise Permissions for Secure Data Migration
Su San Talks Tech
Su San Talks Tech
Jan 19, 2025 · Information Security

How Data Masking Protects Sensitive Information: Techniques and Best Practices

This article explains data masking techniques—including static (SDM) and dynamic (DDM) methods—detailing how to protect sensitive fields like phone numbers and IDs through replacement, truncation, encryption, randomization, and other schemes, while preserving data utility for testing and analysis.

Dynamic Maskingdata anonymizationdata masking
0 likes · 8 min read
How Data Masking Protects Sensitive Information: Techniques and Best Practices
Su San Talks Tech
Su San Talks Tech
Apr 5, 2024 · Information Security

How Data Masking Protects Sensitive Information: Techniques & Best Practices

This article explains why personal data leaks happen, defines data masking (desensitization), compares static and dynamic masking, and details six common masking techniques—invalidating, randomization, replacement, symmetric encryption, averaging, and offsetting—to help developers safeguard privacy.

Dynamic Maskingdata anonymizationdata masking
0 likes · 8 min read
How Data Masking Protects Sensitive Information: Techniques & Best Practices
NetEase LeiHuo UX Big Data Technology
NetEase LeiHuo UX Big Data Technology
May 9, 2022 · Information Security

Data Masking (Data Desensitization) Strategies and Techniques

In the era of big data, protecting sensitive information through static and dynamic data masking techniques—such as nullification, randomization, substitution, symmetric encryption, averaging, and offset—ensures data security while preserving usability for development, testing, and analytics.

Dynamic Maskingdata maskingdata security
0 likes · 8 min read
Data Masking (Data Desensitization) Strategies and Techniques
Code Ape Tech Column
Code Ape Tech Column
Jan 11, 2022 · Information Security

Data Masking (Desensitization) Techniques: Static and Dynamic Approaches

This article explains data masking, its importance for protecting sensitive information, and details both static and dynamic masking methods—including nullification, randomization, substitution, symmetric encryption, mean value, and offset rounding—along with practical examples and implementation considerations.

Dynamic Maskinginformation securityprivacy
0 likes · 8 min read
Data Masking (Desensitization) Techniques: Static and Dynamic Approaches
macrozheng
macrozheng
Dec 17, 2020 · Information Security

How Data Masking Protects Your Users: Techniques & Best Practices

Data masking, also known as data desensitization, transforms sensitive information such as phone numbers and ID numbers using static and dynamic methods—including truncation, randomization, replacement, encryption, and averaging—to prevent privacy breaches while preserving data utility for testing, analysis, and production environments.

Dynamic Maskingdata anonymizationdata masking
0 likes · 9 min read
How Data Masking Protects Your Users: Techniques & Best Practices