How to Protect Data in AWS S3

…S3 problem is similar to the least access privilege problem in file folder analysis— knowing about open and over-privileged employees. Separate from access, location and cross-border transfer represent new kinds…

Shielding Privacy in Texas: Understanding TDPSA

…Data Minimization Principles: Businesses should limit data collection to what is “adequate, relevant, and reasonably necessary” to achieve the purposes of collection disclosed to a consumer. Enable consumer rights: Businesses…

From the CIA to CCPA: What’s Next in Privacy

…in 2016. “You hear all the time, ‘Oh, it was passed in a week—it was written in a week!’ And that couldn’t be further from the truth.” Working hand-in-hand with…

Defusing Data Risk: How to Neutralize Toxic Data Combinations

…PI, PII, payment-related information, healthcare records, SSNs, and much more. Find Toxic Combos Build and configure unique, composite identifiers that represent toxic combinations you’d like to highlight and deem highly…

How BigID Automates Data Security for Financial Services

…privacy and regulatory requirements. These include Sarbanes-Oxley (SOX), Gramm-Leach-Bliley Act (GLBA), Payment Card Industry Data Security Standard (PCI-DSS), and the EU General Data Protection Regulation (GDPR). Compliance with data protection…

NDMO Framework: Streamlining Compliance in Saudi Arabia

…data transfers and seek automated approvals as necessary. Data Protection Assessments: Utilize automated tools to conduct privacy impact assessments (PIA) for such transfers. Compliance Monitoring and Reporting: Real-Time Compliance Monitoring:…

4 Ways to Mature Your DCAM Capabilities with BigID

…step from “developmental” to “defined” is known as “the capability chasm,” and presents challenges for organizations that include: monitoring new business and data models, data inventory, and data sets continuously…