Bitglass
Healthcare: A Cloud Security Investigation (CSI)
This post was originally published here by Will Houcheime . More and more, modern healthcare firms are turning to cloud-based tools and enabling mobile data access from personal devices, bringing them higher productivity and employee satisfaction rates. However, organizations that allow physicians to work from unmanaged endpoints have significant data leakage concerns when they fail to equip themselves […]
Bitglass Security Spotlight: Breaches Expose Millions of Emails, Texts, and Call Logs
This post was originally published here by Will Houcheime. Here are the top cybersecurity stories of recent weeks: 773 million email accounts published on hacking forum Unprotected FBI data and Social Security numbers found online Millions of texts and call logs exposed on unlocked server South Korean Defense Ministry breached by hackers Ransomware forces City […]
Bitglass Security Spotlight: DoD, Facebook, & NASA
This post was originally published here by Will Houcheime. Here are the top cybersecurity stories of recent weeks: Cybersecurity vulnerabilities found in US missile system Facebook shares private user data with Amazon, Netflix, and Spotify Personal information of NASA employees exposed Chinese nationals accused of hacking into major US company databases Private complaints of Silicon […]
Cornerstone Capabilities of Cloud Access Security Brokers
This post was originally published here by Jacob Serpa. Traditional security tools are not built to protect cloud data that is accessed from personal devices around the clock and around the world. With the rise of bring your own device (BYOD) and cloud-based tools like AWS, Office 365, and Salesforce, it can be challenging to figure out which technologies are […]
Bitglass Rising: 2018 Recap
This post was originally published here by Will Houcheime. Now that 2018 is in the books, we at Bitglass wanted to take the time to reflect on some of the biggest moments of this past year. Each team within the company had some great accomplishments that helped us reach new heights. We feel that every […]
Bitglass Security Spotlight: Quora and Healthcare Breaches
This post was originally published here by Will Houcheime. Here are the top cybersecurity stories of recent weeks: 100 million Quora users affected by data breach First multi-state healthcare breach impacts 3.9 million Australia’s anti-encryption bill becomes law Unprotected MongoDB server exposes 66 million Malware attack undetected for four years 100 million Quora users affected […]
SaaS Apps And the Need for Specialized Security
This post was originally published here by Paul Sullivan. Keeping cloud services running is a complex, multi-faceted endeavor for cloud service providers. They need to juggle adding new features, keeping their customers’ sensitive data secure, and having high uptime for their services – there is virtually no room for error. Microsoft learned about the need […]
Bitglass: a one-way trip to Secureland
This post was originally published here by Michael Tamayo. It’s that time of year again – the time to spend with those you hold dear so you can look back and reflect on the past year. If we look back even further, we can see the progress from our humble (yet ambitious) beginnings to our […]
Bitglass: Securing Smartsheet from Day One
This post was originally published here by Will Houcheime. Smartsheet is a software-as-a-service (SaaS) applicationthat gives employees the ability to assign tasks, manage projects, and track their progress. According to Forbes, it is being used by 72 percent of Fortune 500 companies. However, without advanced cloud security solutions, companies put themselves at risk when working with apps […]
Reflections from Gartner’s IAM Summit 2018
This post was originally published here by Sophia Zheng. The Bitglass team just returned from the Gartner Identity and Access Management Summit in Las Vegas. At the booth and during speaking sessions, it seemed like there were several trends in identity and data protection that continually bubbled to the surface. First, the use of user […]