ChaptersEventsBlog
Register for DataSecAI 2025 in Dallas – Protect Data, Secure AI, and Drive Innovation

All Articles

All Articles
2015 Bitglass Cloud Security Report : Security Still Cloud's Achilles Heel

Blog Published: 03/12/2015

By Christopher Hines, Product Marketing Manager, BitglassThe cloud. Companies want it, but can they secure it? Moving to cloud applications like Salesforce, Office 365 and Box, can be beneficial for business but companies must first answer the question of security. Today we announced the findi...

Securing the Intersection of Sanctioned and Unsanctioned Apps in Cloud Ecosystems

Blog Published: 03/23/2015

If you are in charge of deploying a cloud app or suite like Box, Office 365, or Google Apps in your environment, you need to read this:by Krishna Narayanaswamy, Chief Scientist, NetskopeWe just completed a piece of research here at Netskope on cloud app ecosystems. In it, we highlight an impor...

Cloud Computing – It’s a Question of Trust

Blog Published: 03/27/2015

By Raj Samani, Vice President and CTO, McAfee EMEACan we really trust cloud computing? Or perhaps more importantly do you trust the cloud? And does the perceived lack of transparency, combined with recent negative headlines, impact future investments in cloud computing?In conjunction with the ...

Top 3 Reasons Enterprises Hesitate to Adopt the Cloud

Blog Published: 04/02/2015

By Stephanie Bailey, Senior Director/Product Marketing, PerspecsysDespite the clear benefits of the cloud, many enterprises still hesitate to fully adopt or capitalize on all the advantages. There are a few key reasons for hesitation, including the prevalence of data breaches and hacks in rece...

The Bitglass "Where's Your Data?" Experiment

Blog Published: 04/07/2015

By Chris Hines, Product Marketing Manager, Bitglass783. That's the total number of reported breaches involving stolen data that occured in 2014 alone.When the story first broke about the Morgan Stanley breach, where an ex-employee stole corporate data and pasted it on a file-sharing site calle...

The Cloud Guide to RSA

Blog Published: 04/10/2015

By Sam Bleiberg, Communications Associate, SkyHigh NetworksSan Francisco hosts more than its share of conferences and festivals, and residents know the best way to maximize your time at events is to go in with a plan. With that in mind, we created a Skyhigh guide to RSA. Planning your agenda f...

The Cloud Economy: 11 Essential Trends About How Companies Connect to Each Other Via the Cloud

Blog Published: 04/21/2015

By Kamal Shah, VP, Products and Marketing at Skyhigh NetworksThe cloud is having a measurable impact on business – IT departments are migrating to cloud services in order to take advantage of faster time-to-market, reduced operational costs, and reduced IT spending and maintenance costs. In ad...

Compromised Accounts and Cloud Activity

Blog Published: 04/23/2015

By Krishna Narayanaswamy, Founder and Chief Scientist, NetskopeLast week, we released our Netskope Cloud Report for this quarter – global as well as Europe, Middle East and Africa versions.This report builds on our January Netskope Cloud Report in which we highlighted research on compromised u...

Banking on the Cloud: How to Enable File Sharing in Financial Services

Blog Published: 04/27/2015

By Chau Mai, Sr. Product Marketing Manager, Skyhigh NetworksAccording to Gartner, CISOs face a “double-edged sword” as they are tasked with combating the growth of shadow IT while enabling secure access to approved cloud services. Cloud file sharing and collaboration services can be an area of...

White-Hat Malware

Blog Published: 04/29/2015

By Chris Hines, Product Marketing Manager, Bitglass As many of you know, we recently released the results of the first ever data tracking experiment in the Dark Web. In the “Where’s Your Data?“ experiment, we used our patent-pending watermarking technology to embed invisible trackers withi...

CLOUD SECURITY: HOW CAN GRC HELP?

Blog Published: 05/01/2015

By Vibhav Agarwal, Senior Manager of Product Marketing, MetricStreamAn integrated GRC approach to cloud acceptance, adoption and scale includes the risk perspective from the beginning. Harnessing the power of cloud security with a GRC framework can promote and improve information security prac...

CSA to Hold Inaugural Federal Summit on May 5th in Washington DC

Blog Published: 05/04/2015

The CSA is excited to announce that it will be holding its inaugural Federal Summit 2015 on May 5th in Washington DC. The Cloud Security Alliance Federal Summit is a free for government event, comprised of information security professionals from civilian and defense agencies to share experienc...

3 Things Startups Need to Know to Move to the Cloud

Blog Published: 05/05/2015

By Shellye Archambeau, CEO, MetricStreamDespite concerns around data security, businesses are optimistic about the cloud. In fact, software-as-a-service adoption has more than quintupled from 13 percent in 2011 to 72 percent in 2014, according to a cloud computing survey conducted by North Bri...

The Top 10 Cloud Services in Government That Don’t Encrypt Data at Rest

Blog Published: 05/07/2015

By Cameron Coles, Sr. Product Marketing Manager, Skyhigh NetworksSensitive data in the cloud is more widespread than you may think. Analyzing cloud usage for 15 million users, Skyhigh found that 22% of documents uploaded to file sharing services contained sensitive data such as personally iden...

HIPAA-Compliant BYOD After the Honeymoon

Blog Published: 05/11/2015

By Nat Kausik, CEO, BitglassWe met with the head of compliance of a large state healthcare organization last week. They were struggling with achieving HIPAA compliant mobility and shared their experiences and insights with us.To start, mobile technologies are changing so rapidly that any attem...

Balancing IT Risk and Opportunity

Blog Published: 05/13/2015

By David Williamson, CISSP, CGEIT, CRISC, Vice President - Professional Services, MetricStreamFor business managers, moving portions of our company’s most valued information assets into the public cloud, while compelling economically, raises a thicket of difficult risk and compliance questions...

Lifehack: 4 Things to Stop Doing When It Comes to O365 Security

Blog Published: 05/20/2015

By Chris Hines, Product Marketing Manager, BitglassI’m sure you have read a million blogs about what you should be doing when it comes to achieving security for cloud applications like Office 365. I know because admittedly I have written some of them myself. But an idea came to me yesterday as...

LogJam Exposed: 575 Cloud Services Potentially Vulnerable to Man-in-the-Middle Attacks

Blog Published: 05/21/2015

By Sekhar Sarukkai, VP of Engineering, Skyhigh NetworksLogJam, the latest in a spate of web vulnerabilities, was exposed on Tuesday evening by a team including Mathew Green, assistant research professor at Johns Hopkins University, experts from University of Michigan and the University of Penn...

Governance, Risk, Compliance and Cloud: A Fresh Look at Benefits, Value Proposition

Blog Published: 05/22/2015

By Nanda Ramanujam, Director of GRC Solutions/PS-North America, MetricStreamToday’s world is undergoing phenomenal and unprecedented change. From political chaos and economic volatility, to great strides in the fields of science and technology, to an increasingly savvy and global workforce. Al...

CSA Establishes Quantum-Safe Security Working Group and Releases What is Quantum-Safe Security Position Paper

Blog Published: 05/28/2015

By Frank Guanco, Research Analyst, CSAConsider this scenario: A CIO at a Fortune 500 company receives a call from a reporter asking how the company is responding to the announcement of the new commercially available quantum computer that can “break” RSA and Elliptic Curve Cryptography (ECC). T...

Looking for the CCM?

Start using the Cloud Controls Matrix to simplify compliance with multiple standards & regulations.