Skip to content

Blog

Executive Order: Securing Sensitive Personal Data Transfers in the US

March 7, 2024

By Verrion Wright

…transfers and data access requirements. With BigID, organizations can: Discover Data: Discover and catalog your sensitive data, including structured, semi-structured, and unstructured – in on-prem environments and across the cloud….

Blog

A Guide to Data Security Posture Management (DSPM)

October 3, 2024

By Alexis Porter

…360° view of data: Uncover all types of data, known and unknown, as well as hidden cloud data. Identify duplicate, similar, redundant, obsolete, and trivial (ROT) data. Detect sensitive and

Blog

SEC Cybersecurity Disclosure Regulation Checklist

March 14, 2024

By Verrion Wright

…compliance with the SEC’s new cybersecurity rules and requirements: Cybersecurity Incident Prevention: Discover dark, shadow, ROT, duplicate, similar, non-business critical data, and more. Map, label, tag, and flag sensitive, high-risk…

Blog

Data Privacy Predictions: 2023 and Beyond

December 27, 2022

By Verrion Wright

for 2022 Instagram Meta Platforms Inc. – Ireland | €405.000.000 Epic Games – US | $275,000,000 Twitter – US | $150,000,000 Clearview Al Inc. – Italy | €20.000.000 Clearview Al…

News

Consent Governance: A New Approach

November 13, 2018

By Lonnie

…store consent logs. But the question is what next, once consent have been logged? Enter consent governance, which will allow organizations to align when, how and what consent was provided…

Blog

Data Privacy: Definition, Compliance & More

August 23, 2022

By Verrion Wright

…personally identifiable information (PII) should be properly collected, accessed, processed, stored, protected, and shared. Data security protects sensitive data from being compromised by data breaches, hackers, unauthorized access, and malicious…