Bitglass
Saturday Morning Security Spotlight: Breaches and Intel
This post was originally published here by Jacob Serpa. Here are the top cybersecurity stories of recent weeks: Data on 123 million US households leaked Tech giants investing in healthcare technology Intel chips contain security vulnerability DHS suffers breach of over 247,000 records Forever 21 finds malware in PoS systems Data on 123 million US […]
Bitglass – Elevating Cloud Security in 2018
This post was originally published here by Dean Hickman-Smith. 2017 was an amazing year for Bitglass. We hired an incredible team of A-players, built a global organization, grew the business 300% over the prior year, and added over 100 channel partners in order to scale and meet customer demand for our leading cloud access security broker […]
What 2018 Brings for the CASB Market
This post was originally published here by Rich Campagna. Cloud Access Security Brokers (CASBs) have only been around for a few short years, yet have gone through rapid evolution throughout that time. There have been several distinct phases of CASB adoption in the last three years, with yet another phase beginning as we start 2018. Let’s […]
500M Breached Records – Preventable with a Next-Gen CASB
This post was originally published here by Rich Campagna. Amazingly, yet another data breach due to misconfigured Amazon S3 buckets has hit the news this week. This one exposing the personal information of 123 million individuals! The company in question, Alteryx, is a data analytics firm — an organization that should know full well the value of data […]
Turns out everyone has budget for a CASB
This post was originally published here by Salim Hafid. Cloud security represents a fast growing part of most organizations’ budgets, but many CISOs are left deciding between costly point solutions. Fortunately, cloud access security brokers have emerged as a means of bundling critical capabilities across data protection, threat protection, identity management, and visibilityat a relatively low cost. […]
Saturday Morning Security Spotlight: Jail Breaks and Cyberattacks
This post was originally published here by Jacob Serpa. Here are the top cybersecurity stories of recent weeks: Man attempts prison break through cyberattacks Mailsploit allows for perfect phishing attacks 1.4 billion credentials found in dark web database Starbucks WiFi hijacks connected devices Hackers target cryptocurrency employees for bitcoins Man attempts prison break through cyberattacks […]
The Ins and Outs of Shadow IT
This post was originally published here by Paul Sullivan. Shadow IT refers to the unsanctioned applications used by employees who disregard IT’s app approval processes. By definition, this means that IT departments lack complete visibility into what is being used to store and process data. This invites risks like data exfiltration from malicious insiders, upload of sensitive data to […]
Bitglass the Sole Visionary in Gartner Magic Quadrant for CASB
This post was originally published here by Rich Campagna. If you haven’t yet seen it, Gartner recently released the very first Magic Quadrant for Cloud Access Security Brokers,1 and Bitglass was honored to be named the sole Visionary. According to Gartner, “Visionaries invest in leading-edge/”bleeding”-edge features that will be significant in next-generation products, and that give buyers […]
Private App Cloud Migration Requires CASB
This post was originally published here by Rich Campagna. Cloud Access Security Brokers (CASB) have gotten a lot of adoption over the past couple of years, with Gartner recently publishing their first Magic Quadrant for CASBs. Since Cloud is in the name, most organizations think of CASB when trying to achieve their security and compliance goals for public SaaS […]
Insider Threats, Machine Learning, and the Next-Gen CASB
This post was originally published here by Kevin Gee. One of the biggest dangers to application security is that of the insider threat. This ranges from users who unknowingly expose credentials and sensitive data to external parties, to disgruntled employees who act against the company’s interests. These threats are difficult to prevent with common security configurations and are big reasons why user and entity behavior analytics (UEBA) is such a common buzzword within the security industry. It is absolutely critical for any […]