The 12 Data Privacy Vendors that Matter Most

…With our latest modular apps – including apps for PIA, RoPA, Privacy Portal, Data Retention, and more, we’re continuing to help customers adapt to the evolving challenges of privacy regulations….

Data Privacy Day 2023: 8 Steps Towards Regulatory Compliance

PIAs, driving retention policies, and facilitating data deletion requests. Step 4: Assessing and Mitigating Privacy Risk Once organizations can monitor how data flows internally and externally, businesses will better understand…

Coast to Coast: Exploring US State Privacy Laws

…2020, California voters approved the CPRA, which amended and expanded the CCPA. While the CPRA took effect on December 16, 2020, most of its revisions to the CCPA did not…

Security by Design: Secure From the Start

Security by Design meaning Security by design is a concept that refers to the integration of security measures into the design and development of a product, system, or application from…

Introducing the BigID App Marketplace

Today we’re thrilled to announce the BigID App Marketplace: designed to drive innovation and foster transformational apps for data privacy, security, and governance – all in a unified platform. BigID’s…

Top 10 Security Concerns for 2024 and Beyond

…perform their designated tasks. This approach minimizes the risk of excessive access rights, limiting the potential damage that could result from compromised credentials. IAM strategies must be applied consistently across…

Bridging the Privacy Office with IT

Good privacy office programs work best when coupled with good data knowledge. From PIAs, to DSARs and RoPAs, privacy process has its greatest impact and validity when married to actual…