PII and Its Many Forms

Cole PrudenPersonally Identifiable Information, Self-Hosted Auditing Software, Sensitive Data Protection

Sometimes, it feels like the goal of tech agencies and federal regulations, such as the GDPR, is to confuse us. Unless you’re used to using terms like “protected information” and “sensitive data” and seeing acronyms like PII, PCI, HIPAA, etc., this topic can seem a little daunting. So, let’s break it down and learn the exact differences between frequently used … Read More

What Are Sensitive Data Discovery Tools and How Do They Work?

Cole PrudenData Discovery, Personal Data, Real-Time Automation

With technology progressing and changing every day, it can sometimes be difficult to keep up with the times. As a business, however, falling behind can mean letting important (and legally binding) information fall through the cracks, disappointing customers and losing the trust of business partners. This is where sensitive data discovery tools come into play. But what exactly are they … Read More

Detect person names in text: Part 2 (Technical)

Jan ProcházkaDeep Learning, Personal Data, Whitepaper

Neural network architecture

In Detect Person Names in Text: Part 1 (Results), we benchmarked our new named entity recognizer (NER) against popular open source alternatives, such as Stanford NER, Stanza and SpaCy. Today we dig a little deeper into the NER architecture and technical details. First, recall our main NER objectives. In short, we require our NER to be practical, rather than just … Read More