Bitglass
EU Courts: Companies Don’t Have Unilateral Right to Monitor Employees
This post was originally published here by Salim Hafid. In a major victory for privacy advocates, Europe’s Court of Human Rights has ruled on organizations’ abilities to monitor employee communications with limited consent. While precedent set in 2016 gave employers blanket ability to monitor traffic “to verify that the employees are completing their professional tasks during working […]
Bitglass Survey: 30% Take over 24 Hours for Breach Response
This post was originally published here by Chantelle Patel. In the game of cloud security, you win or you lose. Year over year, more organizations are under threat and losing the battle to keep data safe from malicious outsiders and careless insiders. Earlier this month, Bitglass partnered with Crowd Research Partners to survey over […]
reflections: gartner catalyst
This post was originally published here by Jacob Serpa. Last week, Bitglass participated in Gartner Catalyst, a conference designed to educate organizations’ technical staffs. Whether it was from conversations at Bitglass’ booth, or from Gartner and vendor speaking sessions, a number of trends consistently bubbled to the surface. Technological Evolution Technology is in a constant state of […]
datawatch: beware of careless insiders
This post was originally published here by Jacob Serpa. Every day, employees around the world use the cloud to perform their jobs. With bring your own device (BYOD), workers are given dynamic data access to complete their work from unmanaged devices, remote locations, and unsafe WiFi. Due to the host of modern cloud applications, corporate information can […]
the great casb: part three
This post was originally published here by Jacob Serpa. In Part Two, we discussed the capabilities needed for the cloud security of organizations operating in the modern business world. While these features are necessary, they are not sufficient for complete cybersecurity. As companies continue to embrace BYOD, employees will be making greater use of their personal mobile devices for […]
the great casb: part two
This post was originally published here by Jacob Serpa. In Part One, we discussed modern business trends like the move to the cloud, BYOD, the shared responsibility model of security, and how each of them necessitates the use of a cloud access security broker (CASB). CASB platforms typically leverage proxies and cloud apps’ APIs to protect data across cloud apps. […]
the rise of the casb
This post was originally published here by Chantelle Patel. The cloud access security broker (CASB) market has changed drastically over the last few years. As more and more organizations move to the cloud and make use of cloud applications, they are faced with the reality that their IT departments are ultimately responsible for protecting data at […]
the great casb: part one
This post was originally published here by Jacob Serpa. Why You Need a CASB Now more than ever, enterprises are turning to the cloud. By using IaaS and SaaS applications, companies are able to gain a number of benefits that are unavailable with rigid, traditional solutions. For example, migrating to the cloud allows firms to cut down on the […]
agentless casb accelerates ransomware disaster recovery
This post was originally published here by Anurag Kahol. The recent ransomware attacks that ravaged organizations around the globe last week have brought sudden attention to a longstanding problem. Few enterprises today are prepared for a ransomware attack and while most discussions focus on detection capabilities, disaster recovery is often overlooked. Disaster recovery strategies have always focused […]
verizon breach: how cloud encryption can save your data
This post was originally published here by Chantelle Patel. As has been widely reported, Verizon is the latest enterprise to be hit with a large-scale data breach. Over 14 million customer records were left exposed due to a misconfiguration in Verizon’s Amazon Web Services(AWS) instance. Among the leaked information were logs containing customer names, cell phone numbers, and […]