Skip to content

Oh the Places Secrets Go…

In a code based world, it’s convenient for developers to store static secrets and configuration files containing passwords with the code they develop. Not only is this bad …

Data-Centric Security for Google

Extend Bigid Access Intelligence & Data Labeling to Protect Your Data in Google With the rise in cloud adoption, organizations are even more dependent on their IT and …

The State of Data Security in 2022

Data is an organization’s single most valuable asset, relied upon to make critical strategic and operational decisions every day. Much of this information is highly sensitive or critical …

CIS Control 3 for Data Protection

The CIS (Center for Internet Security) — which consists of multiple industry experts and leaders in government agencies — has a set of 18 universal, industry-agnostic guidelines, or …