Bitglass
The Next-Gen CASB Takes Evolve 2018 by Storm
This post was originally published here by John Maciel. Bitglass just attended Evolve 2018. Trace3 did an excellent job preparing the event and ensuring that it was a success for everyone in attendance. Attendees were able to learn about many topics ranging from AI, VR, IoT, and PM (yes, Peyton Manning), and, of course, CASBs […]
Bitglass Security Spotlight: LinkedIn, Vector, and AWS
This post was originally published here by Jacob Serpa . Here are the top cybersecurity stories of recent weeks: LinkedIn security gap exposes users’ data Vector app reveals customers’ information AWS misconfiguration makes LocalBlox user information public New malware steals data via powerlines Banking apps deemed the most unsecured LinkedIn security gap exposes users’ data LinkedIn’s […]
How ChromeOS Dramatically Simplifies Enterprise Security
This post was originally published here by Rich Campagna. Google’s Chromebooks have enjoyed significant adoption in education, but have seen very little interest in the enterprise until recently. According to Gartner’s Peter Firstbrook in Securing Chromebooks in the Enterprise (6 March 2018), a survey of more than 700 respondents showed that nearly half of organizations will definitely […]
Microsoft Workplace Join Part 2: Defusing the Security Timebomb
This post was originally published here by Chris Higgins. In my last post, I introduced Microsoft Workplace Join. It’s a really convenient feature that can automatically log users in to corporate accounts from any devices of their choosing. However, this approach essentially eliminates all sense of security. So, if you’re a sane and rational security professional […]
Cambridge Analytica for Corporate SaaS?
This post was originally published here by Nat Kausik. Cambridge Analytica was able to extract the personal information of zillions of Facebook users via Facebook’s well-provisioned API, in broad daylight. Is similar extraction possible for corporate SaaS apps? Yes, of course. For years, Facebook provided a sophisticated API for connected apps to extract information stored […]
Majority of Australian Data Breaches Caused by Human Error
This post was originally published here by Rich Campagna. It wasn’t long ago that the first breach under the Office of the Australian Information Commissioner’s (OAIC) Privacy Amendment Bill was made public. Now, OAIC is back with their first Quarterly Statistics Report of Notifiable Data Breaches. While the report doesn’t offer much in the way of detail, it does highlight […]
Are Traditional Security Tools Dead?
This post was originally published here by Salim Hafid . When evaluating security options, CISOs and security architects are always looking to the solution that will minimize cost and administrative overhead while maximizing data protection. At the highest levels, enterprises have relied on traditional tools as a means of protecting data over the long term, but […]
Surprise Apps in Your CASB PoC
This post was originally published here by Rich Campagna . Barely five years old, the Cloud Access Security Broker(CASB) market is undergoing its second major shift in primary usage. The first CASBs to hit the market way back in 2013-2014 primarily provided visibility into Shadow IT. Interest in that visibility use case quickly waned in favor of […]
Come #RockTheCASB with Bitglass at RSA 2018
This post was originally published here by Jennifer Perisho. Heading to RSA 2018? If so, visit Bitglass at Booth #3642 (AKA CASB Cove) to learn about the latest in cloud security and grab your very own, limited edition “Rock the CASB: Zero-Day Tour” t-shirt. If that is not reason enough, below are the other opportunities Bitglass is offering to help you have […]
Saturday Security Spotlight: Walmart, Leaks, and Slingshot
This post was originally published here by Jacob Serpa . Here are the top cybersecurity stories of recent weeks: Walmart partner’s S3 misconfiguration exposes data of 1.3 million customers Misconfigured servers leak healthcare data Malicious cryptomining impacting businesses Slingshot malware begins its assault UK government increasing its use of AWS Walmart partner’s S3 misconfiguration exposes data […]