PII Tools Navigation
  • Why PII Tools
  • Product Tour
  • Pricing
  • Company
    • About us
    • Contact
  • Resources
    • Articles
    • Download product brochure
    • Browse sample report
    • Developer API
  • Schedule a demo
  • Why PII Tools
  • Product Tour
  • Pricing
  • Company
    • About us
    • Contact
  • Resources
    • Articles
    • Download product brochure
    • Browse sample report
    • Developer API
  • Schedule a demo

Tag Archive

Finding Affected Persons in a Data Breach

RadimAugust 30, 2020Data breach, Personal Data

There was a data breach, the clock starts ticking. The dataset is large. How do you quickly determine who’s affected and how?

Exclude PII / PCI / PHI From a Breach Report

RadimAugust 30, 2020Data breach, Personal Data

When responding to a breach incident, having a clear idea who’s affected and how is a matter of urgency. Manual discovery of PII information is tedious and costly, so automated solutions come in handy. But how to deal with false positives?

Author of Post

Avatar
Radim's bio:
Founder of RARE Technologies. Author of the acclaimed Gensim machine learning software. Radim received his PhD in Machine Learning in 2011.

Schedule a demo

    Categories

    Archives

    Recent Posts

    • What Are Sensitive Data Discovery Tools and How Do They Work?
    • Detect person names in text: Part 2 (Technical)
    • Detect person names in text: Part 1 (Results)
    • How to evaluate PII discovery software
    • Finding Affected Persons in a Data Breach
    • Home
    • Product Tour
    • Pricing (old live)
    • Schedule a demo
    • Terms and conditions
    • Privacy policy
    • Contact us

    PII TOOLS, Ⓒ RARE Technologies