cloud
How to Retain the Right Kinds of Control in the Cloud
This post was originally published by Jacob Serpa. The last several years have seen an unprecedented shift in the way that businesses conduct their operations and employees perform their work. Users are no longer confined to working on premises from desktop computers. Data is being accessed, stored, shared, and processed in new ways. While these […]
WHITE PAPER ON CLOUD SECURITY RISKS – AND HOW TO MITIGATE THEM
This post was originally published by(ISC)² Management. Cloud security today is touted as better than ever. So how do we explain the ever-increasing number of data breaches? According to the new white paper, Cloud Security Risks & How to Mitigate Them, the disconnect arises from a shared security model. Cloud Service Providers protect the datacenter, but customers […]
Bitglass: Deck the Cloud
This post was originally published by Sowmy Krishnakumar. With 2019 at its tail end, I can’t help but reminisce on how eventful the year has been for the Bitglass family. We started the year by securing yet another round of funding to fuel our growth and went on to be featured as a leader in […]
Cloud Adoption 2019: A for Adoption
This post was originally published by Juan Lugo. The Bitglass Cloud Adoption report, which has been conducted multiple times in the past few years, illustrates the magnitude to which organizations are adopting cloud-based SaaS applications. This year’s analysis of over 138,000 companies gives us a look at how much cloud adoption has increased, and whether companies […]
Digital Transformation, Cybersecurity, Cloud Apps, and Cloud Security
This post was originally published by Ben Rice. What you see in the title is what we covered in our latest webinar, but what part of it is really important? All of it? Some? Or is it all just marketing blather that can be ignored? The truth lies in the middle – we are all […]
Glass Class: Protecting Unmanaged Device Access to Cloud Apps
This post was originally published by Will Houcheime. With the rapid adoption of bring your own device (BYOD), companies are in need of a security solution that can secure any device outside of the corporate firewall. Some companies have turned to agent-based tools in order to secure unmanaged device access; however, they consistently find that […]
What the 2019 AWS Security Report Tells Us About Preventing a Cloud Data Breach
This post was originally published by siri oaklander. In the wake of the recent Capital One security breach in their cloud environment on AWS, the security community is taking another look at how we approach cloud security. CloudPassage recently shared guidance in our blog, “Capital One Data Breach: Non-Technical Tips To Not Be A Headline”. Here […]
Preventing a Capital One Cloud Data Breach
This post was originally published by amol sarwate. On July 29, it was announced that there was a Capital One cloud data breach. A hacker had accessed about 100 million credit card applications, and investigators say thousands of Social Security and bank account numbers were also taken. This comes on the eve of the news […]
What the 2019 AWS Security Report Tells Us About Preventing a Cloud Data Breach
This post was originally published by siri oaklander. In the wake of the recent Capital One security breach in their cloud environment on AWS, the security community is taking another look at how we approach cloud security. CloudPassage recently shared guidance in our blog, “Capital One Data Breach: Non-Technical Tips To Not Be A Headline”. Here […]
Encrypt your Cloud Data!
This post was originally published here by Anurag Kahol . After the Capital One hack, our phones are abuzz with customers seeking security. The answer is simple, encrypt your data! The Capital One breach is the first major breach that exploited an application flaw to expropriate a large amount of sensitive data. Prior cloud breaches were the result […]