What You Need to Know About CPPA

…law is implemented across the organization. The CPPA will also allow organizations to gain approval from the OPC for codes of practice and certification programs that establish rules for how…

3 Key Security Threats Facing Retail Today

…to control and protect their sensitive information and opening them up to increased risk. Organizations need to gain visibility into their data across networks, devices, apps, and users — as…

DAMA Day New York

…for data governance, privacy, and security and how your data governance program will benefit from a data-first approach. Attend this BigID-sponsored session to learn: Why a data-up approach is needed…

China’s Privacy Law: Impacts & How to Prepare

…to apply to them may want to begin thinking now through some of the potential operational changes of this law. Some of these considerations are highlighted below: Scope Like GDPR,…

Data Privacy: Definition, Compliance & More

…rights automation applications to automatically discover and classify personal data for protection and accelerate DSAR requests. CCPA: California Data Privacy Act Similar to GDPR, the California Consumer Privacy Act (CCPA)…

Data Insights & Cloud Adoption in the Federal Space

application development, data management — and also smart analytics and machine learning.” Digital Transformation in the Federal Space — a Focus on Outcomes In providing the guidance for the federal…

Privacy-Aware Risk Management for the Public Sector

…a requirement for more a comprehensive approach to data privacy, governance, and compliance. In the recent ServiceNow Rome software platform release, ServiceNow introduced a new Privacy Management application that helps…

Identify Data By Sensitivity for Proactive Decision-Making

…favorite movie. Advanced sensitivity classification rules can be easily deployed in just a few clicks, and tags are automatically applied to the corresponding data objects. Even better? Organizations can automate…

Driving Innovation with Privacy Engineering

…from happening” approach — instead of one that considered privacy from the outset. Since then, Bhajaria has been guided by a need to “shift left,” bringing privacy closer to the…

BigID + Atakama: Data-Centric File Encryption

…Today, we’re happy to announce the availability of our integration with Atakama. Atakama is one of several integral partners who are building applications on top of the BigID platform for…