Skip to content

Blog

Death, Taxes and Breaches; Managing for the Inevitable.

July 17, 2016

β€’ By Dimitri Sirota

…all customers — even further damaging customer confidence and trust. In some cases, those receiving the notifications may not even be current customers. And as recent activity by Twitter shows,…

News

BGR: Phishing Email Scam

August 5, 2016

Dimitri Sirota, CEO of data security firm BigID, agrees with that theory. “Phishing attacks are very successful, since people are so inured to the possibility of being breached.” Using the…

Blog

AI Model Lifecycle: Streamlining Data Management for AI Success

November 21, 2024

β€’ By Alexis Porter

…scalable, and capable of adapting to new challenges. This lifecycle helps mitigate risks, enhance performance, and ensure the ethical use of AI. Download the Enterprise Checklist for AI Governance, Security,…

Blog

DoD Guiding Principles – Collective Data Stewardship

January 31, 2023

β€’ By Phil McQuitty

…types and sources e.g. cloud, on-premises, structured, unstructured, enterprise apps, data pipelines, source code repositories, ticketing systems, mainframes, CMDBs, big data, etc. Automated ML-based advanced data classification (minimal false positives…

Blog

On-Prem to Cloud Migration: Why and How to Do It

January 30, 2025

β€’ By Alexis Porter

…the increased demand, moving to the cloud might be more feasible in the long run. Using cloud services, including software-as-a-service (SaaS), Infrastructure-as-a-service (IaaS), or platform-as-a-service (PaaS), make it easier for

Blog

Understanding Insecure Direct Object References

April 28, 2023

β€’ By Alexis Porter

…data across an organization’s infrastructure, including databases, file servers, cloud storage, and applications. This can help organizations identify areas where IDOR vulnerabilities may exist and prioritize remediation efforts. Access Controls:…