The Early Bird Gets the Virus
Blog Published: 04/09/2018
By Kevin Lee, Systems QA Engineer, BitglassMost people have heard of the proverb, "The early bird gets the worm." The part that many haven't heard is the followup, "But the second mouse gets the cheese." The latter proverb makes a lot of sense when you apply it to the current state of virus an...
Cloud Security and Compliance Is a Shared Responsibility
Blog Published: 04/12/2018
By Gail Coury, Chief Information Security Officer, Oracle CloudOrganizations around the world are ramping up to comply with the European Union’s General Data Protection Regulation (GDPR), which will be enforced beginning on May 25, 2018, and each must have the right people, processes and techn...
Speeding the Secure Cloud Adoption Process
Blog Published: 04/16/2018
By Vinay Patel, Chair, CSA Global Enterprise Advisory Board, and Managing Director, CitigroupInnovators and early adopters have been using cloud for years, taking advantage of the quicker deployment, greater scalability, and cost saving of services. The growth of cloud computing continues to a...
Building a Foundation for Successful Cyber Threat Intelligence Exchange: A New Guide from CSA
Blog Published: 04/16/2018
By Brian Kelly, Co-chair/Cloud Cyber Incident Sharing Center (CISC) Working Group, and CSO/RackspaceNo organization is immune from cyber attack. Malicious actors collaborate with skill and agility, moving from target to target at a breakneck pace. With new attacks spreading from dozens of comp...
Imagine a Day Without Safe Cryptography
Blog Published: 04/19/2018
By Jeffrey Ritter, Visiting Fellow, Kellogg College, University of OxfordEvery security professional, at one time or another (or at many times), confronts executive opposition to changing technology. We all know that every innovation in technology requires adaptations in the security services,...
GDPR Is Coming: Will the Industry Be Ready?
Blog Published: 04/20/2018
By Jervis Hui, Senior Product Marketing Manager, NetskopeWith the impending May 25, 2018, date for GDPR compliance coming up, Netskope worked with the Cloud Security Alliance (CSA) to survey IT and security professionals for a recently released report covering GDPR preparation and challenges. ...
CCSK vs CCSP: An Unbiased Comparison
Blog Published: 04/24/2018
Updated on 7/15/24 to reflect the current versions of the CCSK and CCSP. By Graham Thompson, CCSK, CCSP, CISSP, Authorized Trainer, Intrinsec Security. IntroductionCCSK vs CCSP–I’m commonly asked two questions whenever someone discovers I’m an instructor for both the Cloud Security Alliance C...
Are Traditional Security Tools Dead?
Blog Published: 04/26/2018
By Salim Hafid, Product Marketing Manager, BitglassWhen evaluating security options, CISOs and security architects are always looking to the solution that will minimize cost and administrative overhead while maximizing data protection. At the highest levels, enterprises have relied on traditio...
The Case for CASB: Healthcare
Blog Published: 05/01/2018
By Rich Campagna, Chief Marketing Officer, BitglassOver the past couple of years, Cloud Access Security Brokers (CASBs) have gone from a nascent, barely known technology to the de facto standard for secure public cloud enablement in every enterprise vertical. Early on, it's tough to draw patte...
One Simple Way to Avoid 57 Percent of Breaches
Blog Published: 05/08/2018
By Rich Campagna, Chief Marketing Officer, Bitglass I recently caught wind of a survey of 3000 cybersecurity professionals commissioned by ServiceNow and Ponemon. One of the first statistics that jumped out at me? "57% of data breach victims said they were breached due to an unpatche...
baseStriker: Office 365 Security Fails To Secure 100 Million Email Users
Blog Published: 05/10/2018
By Yoav Nathaniel, Customer Success Manager, AvananWe recently uncovered what may be the largest security flaw in Office 365 since the service was created. Unlike similar attacks that could be learned and blocked, using this vulnerability hackers can completely bypass all of Microsoft’s securi...
Orbitz: Why You Can't Secure Data in the Dark
Blog Published: 05/11/2018
By Jacob Serpa, Product Marketing Manager, BitglassOn March 1, 2018, Orbitz discovered that a malicious party may have stolen information from one of its legacy platforms. The compromised platform housed Orbitz customer information such as mailing addresses, phone numbers, email addresses, and...
Bitglass Security Spotlight: LinkedIn, Vector, and AWS
Blog Published: 05/17/2018
By Jacob Serpa, Product Marketing Manager, BitglassHere are the top cybersecurity stories of recent weeks:—LinkedIn security gap exposes users' data—Vector app reveals customers' information—AWS misconfiguration makes LocalBlox user information public—New malware steals data via power lines—Ba...
Majority of Australian Data Breaches Caused by Human Error
Blog Published: 05/18/2018
By Rich Campagna, Chief Marketing Officer, Bitglass It wasn't long ago that the first breach under the Office of the Australian Information Commissioner's (OAIC) Privacy Amendment Bill was made public. Now, OAIC is back with their first Quarterly Statistics Report of Notifiable Data B...
Surprise Apps in Your CASB PoC
Blog Published: 05/21/2018
By Rich Campagna, Chief Marketing Officer, BitglassBarely five years old, the Cloud Access Security Broker (CASB) market is undergoing its second major shift in primary usage. The first CASBs to hit the market way back in 2013-2014 primarily provided visibility into Shadow IT. Interest in that...
What If the Cryptography Underlying the Internet Fell Apart?
Blog Published: 05/23/2018
By Roberta Faux, Director of Research, EnvietaWithout the encryption used to secure passwords for logging in to services like Paypal, Gmail, or Facebook, a user is left vulnerable to attack. Online security is becoming fundamental to life in the 21st century. Once quantum computing is achieved...
How ChromeOS Dramatically Simplifies Enterprise Security
Blog Published: 05/25/2018
By Rich Campagna, Chief Marketing Officer, BitglassGoogle's Chromebooks have enjoyed significant adoption in education, but have seen very little interest in the enterprise until recently. According to Gartner's Peter Firstbrook in Securing Chromebooks in the Enterprise (6 March 2018), a surve...
CCSK Certification vs AWS Certification – A Definitive Guide
Blog Published: 05/28/2018
Updated on 7/15/24 to reflect the current versions of the CCSK and AWS Certifications. By Graham Thompson, CCSK, CCSP, CISSP, Authorized Trainer, Intrinsec Security. I was recently asked about CCSK certification vs AWS certification and which one should be pursued by someone looking to get ...
Bitglass Security Spotlight: Twitter, PyRoMine, & Stresspaint
Blog Published: 05/31/2018
By Jacob Serpa, Product Marketing Manager, BitglassHere are the top cybersecurity stories of recent weeks:—Twitter exposes user credentials in plaintext—PyRoMine mines Monero and disables security—Stresspaint malware hunts Facebook credentials—MassMiner malware mines cryptocurrency—Access Grou...
Prepare to Take (and Ace) the CCSK Exam at Infosecurity Europe
Blog Published: 05/31/2018
By Ryan Bergsma, Training Program Director, Cloud Security AllianceHere’s a riddle for you. It’s been called the “mother of all cloud computing security certifications” by CIO Magazine. Search Cloud Security said it’s “a good alternative cloud security certification for an entry-level to midra...