Bitglass
The Four Pillars of CASB: Identity
This post was originally published by Juan Lugo. With cloud being so prevalent, it is inefficient for organizations to not consolidate the existing identity and authentication systems used for internal applications. Consequently, employees will no longer need to memorize multiple passwords for the plethora of applications used in-house by utilizing a single sign-on. With the […]
Glass Class: The ZScaler and Bitglass Integration
This post was originally published by Will Houcheime. With the various tools used in today’s cloud-first world, it could be confusing for organizations to find the correct tools they need to protect sensitive data. In light of this, Bitglass and Zscaler have partnered with each other to provide a solution to create a safe zone […]
Digital Transformation, Cybersecurity, Cloud Apps, and Cloud Security
This post was originally published by Ben Rice. What you see in the title is what we covered in our latest webinar, but what part of it is really important? All of it? Some? Or is it all just marketing blather that can be ignored? The truth lies in the middle – we are all […]
An Old Dog With New Tricks
This post was originally published by Edward Lopez. I’ve been in cybersecurity for over two decades, mostly with major vendors on the selling/marketing/building/evangelizing side. I was a VP at one major firewall vendor, a consultant to new startups and a network/security architect at a major US ISP. Along the way, I’ve even garnered six patents […]
The Four Pillars of CASB: Threat Protection
This post was originally published by Juan Lugo. Threat protection, one of the four pillars that makes up Bitglass’s four quadrants, is integral for defense against malware. Bitglass’ CASB (cloud access security broker) can proactively defend against any threat, while other security tools have more of a reactive approach to malware detection and prevention. Oftentimes, months go by […]
Glass Class: Protecting Unmanaged Device Access to Cloud Apps
This post was originally published by Will Houcheime. With the rapid adoption of bring your own device (BYOD), companies are in need of a security solution that can secure any device outside of the corporate firewall. Some companies have turned to agent-based tools in order to secure unmanaged device access; however, they consistently find that […]
The Black Hat Experience with Bitglass
This post was originally published by Molly Hickman-Smith. Following a six-day Vegas experience, I thought it would be interesting to reflect on all the insight and knowledge gained from almost a week of eating, sleeping, and breathing cloud security. As one of the youngest Black Hat 2019 attendees, my point of view was quite unbiased […]
Bitglass Security Spotlight: iPhones Susceptible to a Hack via Text
This post was originally published by Juan Lugo. Earlier this month, Natalie Silvanovich, a Google Project Zero researcher, presented multiple interaction-less bugs in Apple’s iOS iMessage client during the Black Hat security conference in Las Vegas. Silvanovich asserts that these bugs can be used to interact with a user’s device and exploit it. Although Apple […]
The Four Pillars of CASB: Data Protection
This post was originally published by Will Houcheime. In this blog series, we discuss the key capabilities of cloud access security brokers (CASBs), and why organizations are turning to them as they migrate to the cloud. One of the four pillars of CASBs is data protection, which focuses on securing all information going back and forth […]
Cloud Security Posture Management: Why You Need It Now
This post was originally published here by Samantha Nguyen. Gartner recommends that security and risk management leaders invest in CSPM (cloud security posture management) processes and tools to avoid misconfigurations that can lead to data leakage. Although it is a relatively new class of tools, this recommendation comes with reason; CSPM allows for just what its name implies: the management […]