Skip to content

Blog

Security by Design: Meaning, Principles, and Approach

April 11, 2025

β€’ By Alexis Porter

…data retention, and more — all within a single, cloud-native platform. With BigID organizations can: Know Your Data: Automatically classify, categorize, tag, and label sensitive data with unmatched accuracy, granularity,…

Blog

Data Privacy Takes on Emerging Technologies

July 17, 2020

β€’ By BigID

free speech, fair use, innovation, and privacy.” Once termed a “rabid dog” by the Department of Justice for his work responding to government subpoenas, Opshal has watched the state of…

Blog

PCI DSS 4.0: What You Need to Know

April 3, 2024

β€’ By Verrion Wright

…account data types that require encryption, masking, retention, minimization, and more. Gain insights about data access issues around high-risk, sensitive, or critical payment-related data across your environments. Identify, flag, assess,…

Blog

Discover and Protect Crown Jewel Data

March 6, 2020

β€’ By Sarah Hospelhorn

…like Box, Google Drive, O365, Amazon S3, Azure File, HDFS, Snowflake, Outlook, Gmail, Slack, data in motion and more. – Cluster Analysis: BigID’s patent-pending cluster analysis technology leverages advanced machine…

Blog

3 Key Security Threats Facing Retail Today

August 6, 2021

β€’ By BigID

…(usually inadvertently) download malware. Malicious attacks are not a matter of if, but when. To guard against them, retailers need to reduce the attack surface and proactively protect their customer,…

Blog

Role-Based Access Control: The Definitive Guide

May 15, 2024

β€’ By Alexis Porter

…privileges that are logically grouped together based on job functions or responsibilities within an organization. For example, roles could include “Administrator,” “Manager,” “Employee,” or “Guest.” Permissions: Permissions define the actions…