Skip to content

Blog

Data Privacy Day: 3 Strategies for Achieving Compliance in 2024

January 22, 2024

By Verrion Wright

…social security number to a customer or employee. Mapped Identities to Sensitivity Data: Personally Identifiable Information (PII) such as social security numbers (SSN), passport numbers, driver’s licenses, Tax IDs, and

Blog

AI SPM: AI Security Posture Management

January 13, 2025

By Alexis Porter

…processing (NLP), speech recognition, image recognition, and more. These are built on AI models, data pipelines, and infrastructure to support the AI system. AI SPM, or AI security posture management,…

Blog

How BigID Integrates DSPM and Privacy

February 10, 2025

By Dimitri Sirota

…take control of their data security and privacy strategy—without the blind spots. With BigID, organizations can: Know Your Data: Automatically classify, categorize, tag, and label sensitive, personal data accurately, granularly,…

Blog

Document Record of Processing and Sharing Activity

May 11, 2020

By Sarah Hospelhorn

Simplify GDPR, RoPA, and CCPA 3rd Party Reporting requirements with BigID data flow mapping app. Document RoPA based on actual data. Export / Import from existing surveys and spreadsheets. Identify…

Blog

The Future of DSPM in Cybersecurity

August 16, 2023

By Alexis Porter

…view of their data security landscape, enabling them to identify vulnerabilities, mitigate risks, and respond effectively to potential threats. See BigID in Action What is a Data Security Platform (DSP)?…

Blog

Connecticut Data Privacy Act: Safeguarding Privacy Rights

April 14, 2023

By Alexis Porter

What is Connecticut’s CTDPA? Connecticut’s CTDPA (Connecticut Data Privacy Act) is a state law that sets guidelines for how businesses collect, store, and use the personal information of Connecticut residents….

Blog

ISO 31700:The New Consumer Privacy Standard

January 24, 2023

By Alexis Porter

…all their sensitive data, support their privacy framework, implement privacy by design, and achieve compliance at scale. Here’s how: Discover all of your sensitive, regulated, and high-risk data Classify and