Skip to content

Blog

Architecting Privacy: Identity Data As-A-Service

November 28, 2016

By Dimitri Sirota

…design. So while BigID’s identity data APIs provides a springboard to identity data as-a-service, it simultaneously promotes a future of enhanced identity data protection and privacy.        …

Blog

Privacy and Security Metadata Enrichment

June 1, 2020

By Sarah Hospelhorn

…discovered, collected, and imported privacy and security metadata. Capture purpose-of-use for collected data. Flag Opt-in and Opt-out consent. Detect open access and over-permissioned data for structured and unstructured data.  …

Blog

Data Risk Management: Scope, Assessment & Best Practices

May 6, 2025

By Alexis Porter

…external entities. 3. Identify Threats and Vulnerabilities: Identify potential threats to the security of your business information, including cyber threats (e.g., malware, phishing), insider threats, physical security risks, and compliance…

News

Six Steps to Secure Unstructured Data

October 8, 2019

By Heather Federman

Unstructured data stores – text documents, excel spreadsheets, emails, pdfs, and more – store untold volumes of personal and customer data. And as privacy and data protection regulations like the…

Blog

Update on Apache Log4J (Log4Shell) Vulnerability

December 12, 2021

By Roger Hale

…Log4j is a java library used broadly across enterprise software and cloud applications, including Amazon, Apple iCloud, Tesla, Twitter, RedHat, Micecraft, and more. CVE-2021-44228 is an Apache software vulnerability in…