Skip to content

Blog

A Guide to Data Security Posture Management (DSPM)

October 3, 2024

By Alexis Porter

…360° view of data: Uncover all types of data, known and unknown, as well as hidden cloud data. Identify duplicate, similar, redundant, obsolete, and trivial (ROT) data. Detect sensitive and

Blog

SEC Cybersecurity Disclosure Regulation Checklist

March 14, 2024

By Verrion Wright

…compliance with the SEC’s new cybersecurity rules and requirements: Cybersecurity Incident Prevention: Discover dark, shadow, ROT, duplicate, similar, non-business critical data, and more. Map, label, tag, and flag sensitive, high-risk…

Blog

How to Catalog and Govern Unstructured Data Using BigID

March 19, 2025

By Dimitri Sirota

…data across multiple data sources, including: Cloud storage (AWS S3, Google Drive, OneDrive, SharePoint, Dropbox, etc.) Collaboration tools (Slack, Microsoft Teams, Confluence, Jira, etc.) Emails and file systems Enterprise applications…

Blog

Data Privacy Predictions: 2023 and Beyond

December 27, 2022

By Verrion Wright

for 2022 Instagram Meta Platforms Inc. – Ireland | €405.000.000 Epic Games – US | $275,000,000 Twitter – US | $150,000,000 Clearview Al Inc. – Italy | €20.000.000 Clearview Al…

Blog

Data Privacy: Definition, Compliance & More

August 23, 2022

By Verrion Wright

…personally identifiable information (PII) should be properly collected, accessed, processed, stored, protected, and shared. Data security protects sensitive data from being compromised by data breaches, hackers, unauthorized access, and malicious…

Blog

How to Manage Risks in Cloud Environments

October 21, 2022

By Tyler Young

…gap With any new technology or platform there will, inevitably, be growing pains. Cloud computing is no different. Every cloud provider has a different name for compute (EC2 v. VM),…

News

Consent Governance: A New Approach

November 13, 2018

By Lonnie

…store consent logs. But the question is what next, once consent have been logged? Enter consent governance, which will allow organizations to align when, how and what consent was provided…