Data Flows, Google Analytics, and EU-US Data Transfers

…has left businesses scrambling to use other legal mechanisms, such as Standard Contractual Clauses (SCCs), to transfer data. The Aftermath of Schrems II Fast forward to the present. We are…

Harvard Politics Review: Security in a Digital World

…mitigating cyber threats. The Trump administration’s 2019 budget proposal requests $14.983 billion for total cybersecurity funding, up from $13.1 and $14.4 billion in 2017 and 2018, respectively. However, many have…

How Insurance Companies Achieve Compliance with BigID

…up-to-date measures and regulatory trends that apply — or may soon apply — to insurers. These include the California Consumer Privacy Act (CCPA), its amended California Privacy Rights Act (CPRA),…

Automated Data Security for Schools & Institutions of Higher Education

…fraud, identity theft, and extortion tactics, opening schools to non-compliance, reputational damage, and liability. The Gramm-Leach-Bliley Act (GLBA), Family Educational Rights and Privacy Act (FERPA), and Children’s Online Privacy Protection…

Enhance Your Cybersecurity Posture with MITRE ATT&CK

…that attackers use to accomplish their goals. For example, under the “initial access” tactic, there are techniques such as phishing, brute force, and drive-by compromise. By understanding the specific techniques…

Sephora Puts CCPA to the Test

…all California residents, BigID provides organizations with a public-facing self-service privacy portal to complete an end-to-end consumer rights process from the “right to know” your data to the “right to

Navigating Brazil’s LGPD: Compliance Made Simple

…access, loss, or disclosure. Right to Anonymization, Blocking, or Elimination: Individuals have the right to request the anonymization, blocking, or deletion of unnecessary or excessive data. Right to Complaint: Individuals…

The Advent of Privacy Engineering

and de-identify data, and understand the limits of de-identification; 5) Understand current privacy regulatory and self-regulatory frameworks; 6) Understand current technology-related privacy issues; 7) Conduct privacy-related risk assessments and compliance…

Navigating GLBA Compliance: A Comprehensive Guide

…Board, and the Securities and Exchange Commission (SEC), among others. Why is it important? The Gramm-Leach-Bliley Act (GLBA) is important because it helps protect the privacy and security of consumers’…

β€œC” Is for Cookies, but Also Compliance

If you’ve watched Sesame Street, you know that the beloved Cookie Monster is known for saying, “C” is for cookie; that’s good enough for me.” In data privacy, “C” is…

The 8 Hidden Costs of a Data Breach: Insights from the 2024 IBM Report

…Business: AI isn’t just a nice-to-have—it’s becoming essential for modern cybersecurity. If your organization isn’t leveraging AI-powered tools for threat detection, response, and even predictive analytics, you’re leaving millions on…