Modern Endpoint Backup Sees Data Leak Before It Hurts
Blog Published: 07/22/2016
By Ann Fellman, Vice President/Marketing and Enterprise Product Marketing Director, Code42Picture this: You’re enjoying a beautiful summer Saturday, watching your kid on the soccer field, when your phone rings. It’s work. Bummer. “Hi, this is Ben from the InfoSec team. It appears that John Doe...
A Game of Pwns: A Storm of (Pas)swords
Blog Published: 07/25/2016
By Jacob Ansari, Manager, SchellmanDespite their perpetual status as old news, passwords and their security weaknesses continue to make headlines and disrupt security in ever-expanding ways, and the usual advice about better protection continues to go unheeded or, more worryingly, fails to add...
Take-aways from the 2016 Gartner Magic Quadrant for Secure Web Gateways
Blog Published: 08/03/2016
By Atri Chatterjee, CMO, ZscalerToday's smart enterprises, regardless of size, should be looking at a Secure Web Gateway (SWG) as part of their defense-in-depth security strategy. In Gartner’s opinion, if you aren’t using an SWG, you are in all likelihood leaving a hole in your enterprise secu...
Ransomware Growing More Common, More Complex; Modern Endpoint Backup Isn’t Scared
Blog Published: 08/05/2016
By Susan Richardson, Manager/Content Strategy, Code42The growing ransomware threat isn’t just about more cybercriminals using the same cryptoware tools. The tools themselves are rapidly growing more sophisticated—and more dangerous.Ransomware growing exponentially, with no signs of slowing A n...
API vs. Proxy: How to Get the Best Protection from Your CASB
Blog Published: 08/11/2016
By Ganesh Kirti, Founder and CTO, PalerraCloud Access Security Broker (CASB) software has emerged to help IT get its arms around the full cloud security situation. CASBs are security policy enforcement points between cloud service users and one or more cloud service providers. They can reside ...
CISOs: Do You Have the Five Critical Skills of a DRO?
Blog Published: 08/11/2016
By Mark Wojtasiak, Director of Product Marketing, Code42CISOs exploring career advancement opportunities have a new consideration, according to Gartner VP and Distinguished Analyst Paul Proctor. At a Gartner Security & Risk Management Summit presentation in June, Proctor talked about the e...
Five Scenarios Where Data Visibility Matters—A Lot
Blog Published: 08/19/2016
By Charles Green, Systems Engineer, Code42In case you were off enjoying a well-deserved summer holiday and are, like I am, a firm believer in disconnecting from the world while on holiday, you might have missed the recent hacker document dump of the U.S. Democratic National Committee (DNC) ema...
Which Approach Is Better When Choosing a CASB? API or Proxy? How About Both?
Blog Published: 08/22/2016
By Bob Gilbert, Vice President/Product Marketing, Netskope There have been recent articles and blog posts arguing that the API approach is better than the proxy approach when it comes to selecting a cloud access security broker (CASB). The argument doesn’t really make sense at all. Both surely...
Information Security Promises Are Made To Be Broken
Blog Published: 08/25/2016
By Mark Wojtasiak, Director of Product Marketing, Code42Morality insists that people will abide by the law and do the right thing; those promises have and will always be broken.Code42, along with almost every other major player in the information security space attended Black Hat 2016 in Las V...
100 Best Practices in Big Data Security and Privacy
Blog Published: 08/26/2016
By Ryan Bergsma, Research Intern, CSA‘Big data’ refers to the massive amounts of digital information companies and governments collect about human beings and our environment. Experts anticipate that the amount of data generated will double every two years, from 2500 exabytes in 2012 to 40,000 ...
Learning from Delta: The High Cost of Outdated Backup Systems
Blog Published: 08/30/2016
By Susan Richardson, Manager/Content Strategy, Code42Chances are you know someone whose travel plans were snafued by the Delta system outage that cancelled 1,800 flights and delayed thousands more in August. IT experts are now pointing to Delta’s outdated disaster recovery technology as the cu...
Déjà Vu: Moving to the Cloud Means Losing Visibility and Control All Over Again
Blog Published: 09/02/2016
By Todd Beebe, Guest Writer, Intel Security If you have been in IT security as long as I have, when it comes to moving to cloud, you are feeling a certain sense of déjà vu. We have been here before, this place of uncertainty, where we lack visibility into and control over our sensitive data.Th...
CASBs in Healthcare
Blog Published: 09/06/2016
By Rich Campagna, Vice President/Products & Marketing, BitglassInitially a laggard in cloud adoption, the healthcare industry is now adopting public cloud applications en masse, with adoption of cloud based productivity apps like Office 365 and Google Apps. Adoption is up from 8% in 2014 t...
Five IT Security Projects That Will Accelerate Your Career
Blog Published: 09/07/2016
By Cameron Coles, Director of Product Marketing, Skyhigh NetworksThe skills required to be successful in IT security are changing. In a recent survey (download a free copy here) 30.7% IT leaders reported that a lack of skilled IT professionals is the greatest barrier to preventing data loss. R...
Dealing with Dropbox: Unmasking Hackers with User Behavior Analytics
Blog Published: 09/07/2016
By Ganesh Kirti, Founder and CTO, PalerraDropbox was in the news a few months ago due to false reports of a data breach. Unfortunately, they’ve made headlines again. Vice reported that hackers stole over 60 million account details for the cloud storage service. This time, the breach is real, a...
WSJ Warns of Ransomware—Misses the Obvious Solution
Blog Published: 09/09/2016
By Susan Richardson, Manager/Content Strategy, Code42Read through the recent Wall Street Journal ransomware article and you’ll find some great stats on the growing threat and cost. One thing you won’t find: the word “backup.” We’re happy to see ransomware finally getting the attention it deser...
Cybersecurity: “Change or Die”
Blog Published: 09/09/2016
By Paul B. Kurtz, CEO TruSTAR Technology and Member of Board of Directors, Cloud Security Alliance“Change or die” is an old phrase computer programmers use to highlight the speed of change in a world of innovation. Its implications go beyond programming and underscore the precarious situation ...
Eight Questions to Ask When Evaluating a CASB
Blog Published: 09/12/2016
By Rich Campagna, Vice President/Products & Marketing, Bitglass Cloud Access Security Brokers are the hottest technology in enterprise security right now, topping Gartner's Top 10 list two years running. Widespread adoption of major cloud apps like Office 365 (and corresponding cloud secur...
EFSS Spreads Ransomware; Endpoint Backup Guarantees Recovery
Blog Published: 09/14/2016
By Kyle Hatlestad, Principal Architect, Code42One of the objections I’m hearing more and more is, “Why do I need backup when I have Microsoft OneDrive for Business (or Google Drive, Box or Dropbox for Business)?” On the surface, it may seem like endpoint backup isn’t needed because with an ent...
Ran$umBin: Disruptive Innovation for the Black Market
Blog Published: 09/22/2016
By Susan Richardson, Manager/Content Strategy, Code42Sometimes the ingenuity of the free market is truly remarkable. And in the case of the new black market for ransomed data, remarkably scary. One of the latest triumphs of the entrepreneurial spirit is Ran$umBin, a sort of eBay for ransomers—...