Skip to content

Blog

Securing PII vs PHI: Similarities & Differences

August 15, 2024

By Alexis Porter

…individual, personal data rights fulfillment requests from access and updates to appeals and deletion. Comprehensively Assess Privacy Risks: Initiate, manage, document, and complete various assessments, including PIA, DPIA, vendor, AI,…

Blog

BigID Recognized as Leader in All Major DSPM Analyst Reports

May 29, 2025

By Alexis Porter

…both posture and productivity BigID helps organizations connect the dots across data & AI: for security, privacy, compliance, and AI data management. BigID enables customers to find, understand, manage, protect,…

Blog

Security and Compliance Challenges Facing Tech

May 22, 2025

By Alexis Porter

…challenges—at scale. With BigID organizations can: Discover and Classify: Automatically find and classify sensitive, regulated, and high-risk data across all environments—cloud, on-prem, SaaS, structured or unstructured. Govern AI & Model…

Blog

Impactful Big or Small: A Cost Comparison of Data Breaches

February 19, 2025

By Alexis Porter

…with unmatched accuracy, granularity, and scale. Improve Data Security Posture: Proactively prioritize and target data risks, expedite SecOps, and automate DSPM. Enable Zero Trust: Reduce overprivileged access & overexposed data,…

Blog

PII Cybersecurity: Top Threats and Solutions

September 28, 2023

By Alexis Porter

…Compromised: The Equifax breach exposed the PII of approximately 143 million Americans, including names, Social Security numbers, birthdates, and more. Outcome: The breach had severe consequences, including legal settlements, fines,…

Blog

Navigating the Security Landscape of Microsoft Copilot

March 7, 2024

By Alexis Porter

…(PHI) in a manner that doesn’t fully adhere to the Health Insurance Portability and Accountability Act (HIPAA) regulations. Specifically, the generated code lacks proper encryption, audit trails, and access controls,…