ChaptersEventsBlog
Join Cyera’s DataSecAI in Dallas, Nov 12–14 to adopt, activate, and scale AI security for the future.

All Articles

All Articles
Modern Endpoint Backup Sees Data Leak Before It Hurts

Blog Published: 07/22/2016

By Ann Fellman, Vice President/Marketing and Enterprise Product Marketing Director, Code42Picture this: You’re enjoying a beautiful summer Saturday, watching your kid on the soccer field, when your phone rings. It’s work. Bummer. “Hi, this is Ben from the InfoSec team. It appears that John Doe...

A Game of Pwns: A Storm of (Pas)swords

Blog Published: 07/25/2016

By Jacob Ansari, Manager, SchellmanDespite their perpetual status as old news, passwords and their security weaknesses continue to make headlines and disrupt security in ever-expanding ways, and the usual advice about better protection continues to go unheeded or, more worryingly, fails to add...

Take-aways from the 2016 Gartner Magic Quadrant for Secure Web Gateways

Blog Published: 08/03/2016

By Atri Chatterjee, CMO, ZscalerToday's smart enterprises, regardless of size, should be looking at a Secure Web Gateway (SWG) as part of their defense-in-depth security strategy. In Gartner’s opinion, if you aren’t using an SWG, you are in all likelihood leaving a hole in your enterprise secu...

Ransomware Growing More Common, More Complex; Modern Endpoint Backup Isn’t Scared

Blog Published: 08/05/2016

By Susan Richardson, Manager/Content Strategy, Code42The growing ransomware threat isn’t just about more cybercriminals using the same cryptoware tools. The tools themselves are rapidly growing more sophisticated—and more dangerous.Ransomware growing exponentially, with no signs of slowing A n...

API vs. Proxy: How to Get the Best Protection from Your CASB

Blog Published: 08/11/2016

By Ganesh Kirti, Founder and CTO, PalerraCloud Access Security Broker (CASB) software has emerged to help IT get its arms around the full cloud security situation. CASBs are security policy enforcement points between cloud service users and one or more cloud service providers. They can reside ...

CISOs: Do You Have the Five Critical Skills of a DRO?

Blog Published: 08/11/2016

By Mark Wojtasiak, Director of Product Marketing, Code42CISOs exploring career advancement opportunities have a new consideration, according to Gartner VP and Distinguished Analyst Paul Proctor. At a Gartner Security & Risk Management Summit presentation in June, Proctor talked about the e...

Five Scenarios Where Data Visibility Matters—A Lot

Blog Published: 08/19/2016

By Charles Green, Systems Engineer, Code42In case you were off enjoying a well-deserved summer holiday and are, like I am, a firm believer in disconnecting from the world while on holiday, you might have missed the recent hacker document dump of the U.S. Democratic National Committee (DNC) ema...

Which Approach Is Better When Choosing a CASB? API or Proxy? How About Both?

Blog Published: 08/22/2016

By Bob Gilbert, Vice President/Product Marketing, Netskope There have been recent articles and blog posts arguing that the API approach is better than the proxy approach when it comes to selecting a cloud access security broker (CASB). The argument doesn’t really make sense at all. Both surely...

Information Security Promises Are Made To Be Broken

Blog Published: 08/25/2016

By Mark Wojtasiak, Director of Product Marketing, Code42Morality insists that people will abide by the law and do the right thing; those promises have and will always be broken.Code42, along with almost every other major player in the information security space attended Black Hat 2016 in Las V...

100 Best Practices in Big Data Security and Privacy

Blog Published: 08/26/2016

By Ryan Bergsma, Research Intern, CSA‘Big data’ refers to the massive amounts of digital information companies and governments collect about human beings and our environment. Experts anticipate that the amount of data generated will double every two years, from 2500 exabytes in 2012 to 40,000 ...

Learning from Delta: The High Cost of Outdated Backup Systems

Blog Published: 08/30/2016

By Susan Richardson, Manager/Content Strategy, Code42Chances are you know someone whose travel plans were snafued by the Delta system outage that cancelled 1,800 flights and delayed thousands more in August. IT experts are now pointing to Delta’s outdated disaster recovery technology as the cu...

Déjà Vu: Moving to the Cloud Means Losing Visibility and Control All Over Again

Blog Published: 09/02/2016

By Todd Beebe, Guest Writer, Intel Security If you have been in IT security as long as I have, when it comes to moving to cloud, you are feeling a certain sense of déjà vu. We have been here before, this place of uncertainty, where we lack visibility into and control over our sensitive data.Th...

CASBs in Healthcare

Blog Published: 09/06/2016

By Rich Campagna, Vice President/Products & Marketing, BitglassInitially a laggard in cloud adoption, the healthcare industry is now adopting public cloud applications en masse, with adoption of cloud based productivity apps like Office 365 and Google Apps. Adoption is up from 8% in 2014 t...

Five IT Security Projects That Will Accelerate Your Career

Blog Published: 09/07/2016

By Cameron Coles, Director of Product Marketing, Skyhigh NetworksThe skills required to be successful in IT security are changing. In a recent survey (download a free copy here) 30.7% IT leaders reported that a lack of skilled IT professionals is the greatest barrier to preventing data loss. R...

Dealing with Dropbox: Unmasking Hackers with User Behavior Analytics

Blog Published: 09/07/2016

By Ganesh Kirti, Founder and CTO, PalerraDropbox was in the news a few months ago due to false reports of a data breach. Unfortunately, they’ve made headlines again. Vice reported that hackers stole over 60 million account details for the cloud storage service. This time, the breach is real, a...

WSJ Warns of Ransomware—Misses the Obvious Solution

Blog Published: 09/09/2016

By Susan Richardson, Manager/Content Strategy, Code42Read through the recent Wall Street Journal ransomware article and you’ll find some great stats on the growing threat and cost. One thing you won’t find: the word “backup.” We’re happy to see ransomware finally getting the attention it deser...

Cybersecurity: “Change or Die”

Blog Published: 09/09/2016

By Paul B. Kurtz, CEO TruSTAR Technology and Member of Board of Directors, Cloud Security Alliance“Change or die” is an old phrase computer programmers use to highlight the speed of change in a world of innovation. Its implications go beyond programming and underscore the precarious situation ...

Eight Questions to Ask When Evaluating a CASB

Blog Published: 09/12/2016

By Rich Campagna, Vice President/Products & Marketing, Bitglass Cloud Access Security Brokers are the hottest technology in enterprise security right now, topping Gartner's Top 10 list two years running. Widespread adoption of major cloud apps like Office 365 (and corresponding cloud secur...

EFSS Spreads Ransomware; Endpoint Backup Guarantees Recovery

Blog Published: 09/14/2016

By Kyle Hatlestad, Principal Architect, Code42One of the objections I’m hearing more and more is, “Why do I need backup when I have Microsoft OneDrive for Business (or Google Drive, Box or Dropbox for Business)?” On the surface, it may seem like endpoint backup isn’t needed because with an ent...

Ran$umBin: Disruptive Innovation for the Black Market

Blog Published: 09/22/2016

By Susan Richardson, Manager/Content Strategy, Code42Sometimes the ingenuity of the free market is truly remarkable. And in the case of the new black market for ransomed data, remarkably scary. One of the latest triumphs of the entrepreneurial spirit is Ran$umBin, a sort of eBay for ransomers—...

Looking for the CCM?

Start using the Cloud Controls Matrix to simplify compliance with multiple standards & regulations.