Software-Defined Perimeter Architecture Guide Preview: Part 2
Blog Published: 08/23/2018
Part 2 in a four-part seriesBy Jason Garbis, Vice President/Secure Access Products, Cyxtera Technologies Inc.Thanks for returning for the second blog posting, providing a preview of the forthcoming Software-Defined Perimeter (SDP) Architecture Guide (Read Part 1). In this article, we focus on ...
California's CCPA Brings EU Data Privacy to the US
Blog Published: 08/27/2018
By Rich Campagna, Chief Marketing Officer, BitglassOver the summer a new data privacy law, the California Consumer Privacy Act of 2018 (CCPA), was passed. Assembly Bill 375 is scheduled to go into effect on Jan 1, 2020, which means there will likely be a lot of change before we see the final, ...
US CLOUD Act Drives Adoption of Cloud Encryption
Blog Published: 09/05/2018
By Rich Campagna, Chief Marketing Officer, BitglassThe US Clarifying Lawful Overseas Use of Data (CLOUD) Act was quietly enacted into law on March 23, 2018. I say quietly due to the controversial nature of how it was passed—snuck into the back of a 2,300 page Federal spending bill on the eve o...
Avoiding Holes in Your AWS Buckets
Blog Published: 09/07/2018
By Sanjay Kalra, CPO & Co-Founder, Lacework Enterprises are moving to the cloud at a breathtaking pace, and they’re taking valuable data with them. Hackers are right behind them, hot on the trail of as much data as they can steal. The cloud upends traditional notions of networks and hos...
Join CSA's New DC Metro Area Chapter
Blog Published: 09/10/2018
The Cloud Security Alliance (CSA) is pleased to announce that its DC Metro Area chapter has been chartered to serve the DC metro area CSA membership.The chapter's region includes a diverse range of businesses, government organizations and academic institutions who all have an interest in well-...
Pwned Passwords – Have Your Credentials Been Stolen?
Blog Published: 09/14/2018
By Paul Sullivan, Software Engineer, BitglassData breaches now seem to be a daily occurrence. In recent months, Have I Been Pwned (HIBP) introduced Pwned Passwords, which allows you to securely check your password against a database of breach data. There are over 280 breaches in the database,...
Software-Defined Perimeter Architecture Guide Preview: Part 3
Blog Published: 09/18/2018
Part 3 in a four-part seriesBy Jason Garbis, Vice President/Secure Access Products, Cyxtera Technologies Inc.Thanks for returning for our third blog posting, providing a preview of the forthcoming Software-Defined Perimeter (SDP) Architecture Guide. In this article, we’re focusing on the "Core...
PCI Compliance for Cloud Environments: Tackle FIM and Other Requirements with a Host-Based Approach
Blog Published: 09/19/2018
By Patrick Flanders, Director of Marketing, LaceworkCompliance frameworks and security standards are necessary, but they can be a burden on IT and security teams. They provide structure, process, and management guidelines that enable businesses to serve customers and interoperate with other or...
Recommendations for IoT Firmware Update Processes: Addressing complexities in a vast ecosystem of connected devices
Blog Published: 09/20/2018
By Sabri Khemissa, IT-OT-Cloud Cybersecurity Strategist,ThalesTraditionally, updating software for IT assets involves three stages: analysis, staging, and distribution of the update—a process that usually occurs during off-hours for the business. Typically, these updates apply cryptographic co...
CVE and Cloud Services, Part 2: Impacts on Cloud Vulnerability and Risk Management
Blog Published: 09/28/2018
By Victor Chin, Research Analyst, Cloud Security Alliance, and Kurt Seifried, Director of IT, Cloud Security AllianceThis is the second post in a series, where we’ll discuss cloud service vulnerability and risk management trends in relation to the Common Vulnerability and Exposures (CVE) syste...
Software-Defined Perimeter Architecture Guide Preview: Part 4
Blog Published: 10/08/2018
Part 4 of a four-part seriesBy Jason Garbis, Vice President/Secure Access Products, Cyxtera Technologies Inc.Over the past three blog posts on this topic, we’ve provided an overview of the Software-Defined Perimeter (SDP) Architecture Guide, including its outline, core SDP concepts, and a summ...
CCSK in the Wild: Survey of 2018 Certificate Holders
Blog Published: 10/09/2018
Even as more organizations migrate to the cloud, there’s still a concern as to how well those cloud services are being secured. According to an article by Forbes “66% of IT professionals say security is their greatest concern in adopting a cloud computing strategy.” As you embark on your quest...
How Can the Financial Industry Innovate Faster?
Blog Published: 10/15/2018
By Peter HJ van Eijk, Head Coach and Cloud Architect, ClubCloudComputing.comHow can the financial industry innovate faster? Why do non-technical people need to have a basic understanding of cloud technology?Imagine this scenario. Davinci is a company providing a SaaS solution to banks to proce...
Guideline on Effectively Managing Security Service in the Cloud
Blog Published: 10/16/2018
By Dr. Kai Chen, Director of Cybersecurity Technology, Huawei Technologies Co. Ltd.The cloud computing market is growing ever so rapidly. Affordable, efficient, and scalable, cloud computing remains the best solution for most businesses, and it is heartening to see the number of customers depl...
Office 365 Security: It Takes Two to Tango
Blog Published: 10/17/2018
Many cloud apps – including Office 365 – operate under a shared responsibility model. Here’s what that means for your company By Beth Stackpole, Feature Writer, Symantec Security concerns, once a long-standing hurdle to cloud deployment, may be on the wane, but the issue is still very much ...
In Europe, Cloud Is the New Default
Blog Published: 10/19/2018
By Salim Hafid, Senior Product Marketing Manager, BitglassIf you keep up with the blog, you'll remember our 2018 global cloud adoption report, wherein thousands of organizations deployed cloud apps since we last conducted our automated analysis of over 100,000 firms. Many in EMEA wanted to kno...
Bitglass Security Spotlight: Yale, LifeLock, SingHealth, Malware Evolving & Reddit Breached
Blog Published: 10/25/2018
By Jacob Serpa, Product Manager, BitglassHere are the top cybersecurity headlines of recent months:—Future malware to recognize victims' faces—Reddit suffers breach—6 million records of Georgian voters exposed—RASPITE Group attacks US infrastructure—Decade-old breach at Yale uncovered—Bug expo...
POC the CASB
Blog Published: 10/29/2018
By Rich Campagna, Chief Marketing Officer, BitglassThe Cloud Access Security Broker, or CASB, space has quickly made its way to the mainstream, with organizations of every size and every industry deploying CASBs whenever their data moves beyond the firewall.While ready for primetime and widely...
Bitglass Security Spotlight: Veeam, Mongo Lock, Password Theft, Atlas Quantum & the 2020 Census
Blog Published: 10/31/2018
By Jacob Serpa, Product Manager, BitglassHere are the top cybersecurity headlines of recent weeks:—440 million email addresses exposed by Veeam—Unprotected MongoDB databases being targeted—42 million emails, passwords, and more leaked—Cold-boot attacks steal passwords and encryption keys—2 bil...
Bitglass Security Spotlight: Uber, Apollo, & Chegg
Blog Published: 11/05/2018
By Jacob Serpa, Product Manager, BitglassHere are the top cybersecurity stories of recent weeks:—Uber fined $148 million over cover-up—Apollo database of 200 million contacts breached—Chegg hack exposes 40 million users' credentials—Port of San Diego faces cyberattackUber fined $148 million ov...