VA Puts Privacy First | What Is CDPA?

…legislatures looking to enact comprehensive privacy legislation. In addition, there’s a growing consensus that the VA model will inspire other states based on the speed of adoption. And of course,…

4 Steps for a Successful Cloud Migration

…that organizations inventory, assess, stage, and secure their data. Privacy regulations add another dimension of complexity: regulated data requires specific protection like access controls, encryption, and data residency stipulations. Organizations…

Customer Consent; Whose Big Data Is It Anyway

Asking for permission isn’t just good manners any more. Securing and managing customer consent for the use and gathering of their private data will soon become standard operating procedure. Whether…

Labeling 2.0: Data-driven Document Labeling Automation.

…tagging for data objects for consumption by policy enforcement points: • Information rights management vendors like Microsoft Azure Information Protection. • Database audit and protection tools like IBM Guardium. •…

Cookies

…you would like to opt-out of Google Analytics on a per browser basis, please Click Here to download the Google Analytics opt-out browser add-on. For more information on Google Analytics,…

How to Build an Accurate Data Inventory

…critical component for compliance, risk reduction, digital transformation initiatives, cloud migrations, and more — and is essential to maintain accurate data quality for ML and analytics. A successful data inventory…

Why AI Governance Needs Diversity and Inclusion

…repeatable questions such as: “Who gets approval for a bank loan?” in a mortgage company. Another application is an experimental hiring tool by Amazon, where they leveraged AI to help…

Discover and Protect Crown Jewel Data

…to automatically identify and classify sensitive data by type. – Labeling Automation: BigID lets customers leverage their content, file classification, and cluster analysis to simplify labeling retroactively across unstructured files