ChaptersEventsBlog
Get Free Early Access to TAISE Module 3! Sample the Certificate Experience Today!

All Articles

All Articles
Electrify Your Digital Transformation with the Cloud

Blog Published: 12/05/2017

By Tori Ballantine, Product Marketing, HylandTaking your organization on a digital transformation journey isn’t just a whimsical idea; or something fun to daydream about; or an initiative that “other” companies probably have time to implement. It’s something that every organization needs to se...

Your Morning Security Spotlight: Apple, Breaches, and Leaks

Blog Published: 12/07/2017

By Jacob Serpa, Product Marketing Manager, BitglassHere are the top cybersecurity stories of recent weeks:–Apple's High Sierra has massive vulnerability–Survey says all firms suffered a mobile cyberattack–Morrisons liable for ex-employee leaking data–S3 misconfiguration leaks NCF customer data...

What Will Software Defined Perimeter Mean for Compliance?

Blog Published: 12/08/2017

By Eitan Bremler, VP Marketing and Product Management, Safe-T DataYour network isn't really your network anymore. More specifically, the things you thought of as your network — the boxes with blinking lights, the antennae, the switches, the miles of Cat 5 cable — no longer represent the physic...

AWS Cloud: Proactive Security and Forensic Readiness – Part 1

Blog Published: 12/11/2017

By Neha Thethi, Information Security Analyst, BH Consulting Part 1 – Identity and Access Management in AWS This is the first in a five-part blog series that provides a checklist for proactive security and forensic readiness in the AWS cloud environment. This post relates to identity and access...

Decoding NYCRR Part 500: What Finance Institutions Need to Know

Blog Published: 12/13/2017

By Kyle Watson, Identity and Access Management and Cloud Access Security Broker Expert, CedrusFor those of you in organizations subject to NYDFS oversight, you are probably aware of 23 NYCRR 500, a new set of cybersecurity requirements that went into effect this past March for financial servic...

MSP: Is Your New Digital Service Compliant?

Blog Published: 12/15/2017

By Eitan Bremler, VP Marketing and Product Management, Safe-T DataOffering managed services seems like an easy proposition. You offer IT services for companies that don't have the infrastructure to support their own, bundle in services like cloud storage or remote desktop access, then sit back...

Avoid a Breach: Five Tips to Secure Data Access

Blog Published: 12/18/2017

By Jacob Serpa, Product Marketing Manager, BitglassAlthough the cloud is a boon to productivity, flexibility, and cost savings, it can also be a confusing tool to utilize properly. When organizations misunderstand how to use it, they often expose themselves to threats. While there aren’t neces...

It Could Happen To You

Blog Published: 12/20/2017

By Yael Nishry, Vice President/Business Development, Vaultive; Arthur van der Wees LLM, Arthur’s Legal; and Jiri Svorc LLM, Arthur’s LegalFor organizations around the world, implementing state-of-the-art security and personal data protection (using both technical and organizational measures) ...

Adding Value to Native Cloud Application Security with CASB

Blog Published: 12/27/2017

By Paul Ilechko, Senior Security Architect, CedrusMany companies are starting to look at the Cloud Access Security Broker (CASB) technology as an extra layer of protection for critical corporate data as more and more business processes move to the cloud.CASB technologies protect critical corpo...

Saturday Morning Security Spotlight: Jail Breaks and Cyberattacks

Blog Published: 12/29/2017

By Jacob Serpa, Product Marketing Manager, BitglassHere are the top cybersecurity stories of recent weeks:— Man attempts prison break through cyberattacks— Mailsploit allows for perfect phishing attacks— 1.4 billion credentials found in dark web database— Starbucks WiFi hijacks connected devic...

The Stakes for Protecting Personally Identifiable Information Will Be Higher in 2018

Blog Published: 01/04/2018

By Doug Lane, Vice President/Product Marketing, VaultiveWhile it’s tough to predict what the most significant single threat of 2018 will be, it’s safe to say that 2017 was certainly a wake-up call for both businesses and consumers when it comes to data breaches. From the rampant misconfigurat...

Cloud Access Security Brokers: Past, Present, and Future

Blog Published: 01/09/2018

By Jacob Serpa, Product Marketing Manager, BitglassLeading cloud access security brokers (CASBs) currently provide data protection, threat protection, identity management, and visibility. However, this has not always been the case. Since the inception of the CASB market, cloud access security...

Your Top Three Cloud Security Resolutions for 2018 Categories: Blog, Cloud Security

Blog Published: 01/11/2018

By Doug Lane, Vice President/Product Marketing, VaultiveWith 2017 behind us, it’s time to prepare your IT strategy and goals for the new year. There is a good chance that, if you aren’t using the cloud already, there’s a cloud services migration in store for your organization this year. No ma...

Saturday Morning Security Spotlight: Breaches and Intel

Blog Published: 01/15/2018

By Jacob Serpa, Product Marketing Manager, BitglassHere are the top cybersecurity stories of recent weeks: —Data on 123 million US households leaked —Tech giants investing in healthcare technology —Intel chips contain security vulnerability —DHS suffers breach of over 247,000 records —Forever...

Cloud App Encryption and CASB

Blog Published: 01/19/2018

By Kyle Watson, Partner/Information Security, Cedrus DigitalMany organizations are implementing Cloud Access Security Broker (CASB) technology to protect critical corporate data stored within cloud apps. Amongst many other preventative and detective controls, a key feature of CASBs is the abil...

Nine Myths of Account Takeover

Blog Published: 01/25/2018

By Dylan Press, Director of Marketing, AvananAccount takeover attacks are a nearly invisible tactic for conducting cyber espionage. Because these breaches can take months or years to detect, we are slowly discovering that this attack vector is much more common than we thought. The more we lear...

Saturday Security Spotlight: Cyberwarfare and Cryptocurrency

Blog Published: 01/29/2018

By Jacob Serpa, Product Marketing Manager, Bitglass Here are the top cybersecurity stories of recent weeks: —Cyberattacks deemed a top threat to society —Hackers target data around the world —Poor app designs threaten countries' infrastructure —Olympic Committee emails leaked by hacke...

EMV Chip Cards Are Working - That's Good and Bad

Blog Published: 02/02/2018

By Rich Campagna, CEO, BitglassFor many years, credit card companies and retailers ruled the news headlines as victims of breaches. Why? Hackers' profit motives lead them to credit card numbers as the quickest path to monetization. Appropriate data in hand and a working counterfeit card could ...

Why Next-Gen Firewalls Can't Replace CASBs

Blog Published: 02/07/2018

By Joe Green, Vice President, /WW Solutions Engineering, Bitglass A security solution is only as good as the data it protects. Some solutions focus on data protection on the corporate network, others focus entirely on cloud data, and a select few enable security at access from any network. Ne...

Saturday Security Spotlight: Military, Apps, and Threats

Blog Published: 02/12/2018

By Jacob Serpa, Marketing Manager, BitglassHere are the top cybersecurity stories of recent weeks:—Fitness app exposes military bases—Soldiers' names revealed by app—Google Play filled with fake apps—Medical devices easily hacked—The internet of things creates risk for the enterprise Fitness ...

Looking for the CCM?

Start using the Cloud Controls Matrix to simplify compliance with multiple standards & regulations.