Industry Insights

Read the latest cloud security news, trends, and thought leadership from subject matter experts.

Industry Insights
Letting The Right One In: A Preamble to Device Trust

Published: 11/26/2020

Written by Dave Lewis, Advisory CISO — Global at Duo I’m sorry, do I know you? A typical query that people may ask when confronted by an unknown person who walks up abruptly and starts asking them questions. Oddly though, this sort of response does not happen in many network environments. When ...

3 Reasons Why You Need to Include a VRM Platform in 2021

Published: 11/23/2020

This blog was originally published by Whistic here. 2020 has been an incredibly long year for all of us. Honestly, we’re ready to start afresh in 2021. As the past months have brought on some unique challenges for InfoSec teams, they have also revealed areas of opportunity and growth regarding ho...

What is cloud security? How is it different from traditional on-premises network security?

Published: 11/09/2020

Written by Ryan Bergsma, Training Director at CSACloud is also becoming the back end for all forms of computing, including the ubiquitous Internet of Things and is the foundation for the information security industry. New ways of organizing compute, such as containerization and DevOps are insepar...

The 10 Best Practices in Cloud Data Security

Published: 11/03/2020

By Branden Morrow from TokenExCloud Data Security Best Practices OverviewWhat exactly is cloud data security?Cloud security is the culmination of technologies and procedures that secure cloud computing environments against cybersecurity threats originating externally and internally. With cloud co...

Improving Data Security for SaaS Apps - 5 Key Questions every CISO needs to ask

Published: 10/06/2020

By Matt Hines, VP of Marketing at CipherCloud & Neeraj Nayak, Sr. Product Marketing Manager at CipherCloud Summary: The rapid uptake of game-changing SaaS applications has been transforming the way organizations do business long before COVD-19 emerged and the remote workforce exploded overn...

Understanding the Complexities of Securing a Remote Workforce

Published: 09/09/2020

By Sean Gray, Sr. Director InfoSec at Paypal and Co-Chair of the CSA Financial Services Working GroupWe have all witnessed sudden and stunning changes in how companies – big and small – operate in response to the challenges necessitated by COVID-19. Many have pivoted successfully, however there ...

SSO and the Road to Passwordless

Published: 09/01/2020

By Dave Lewis, Advisory CISO — Global at DuoWe’ve all heard the phrase “every journey starts with a single step.” While this might seem obvious on the face of it, we can often feel pressure to immediately arrive at our destination.Discussions around passwordless often are too simplistic or too co...

Can Passwordless Authentication Be Trusted?

Published: 08/17/2020

By J. Wolfgang Goerlich, Advisory CISO for Duo SecurityEvery new feature we introduce to our users is potentially a new tactic we provide our adversaries. When I was learning to drive, this happened with car steering wheel locks. Do you remember these? Big bars people would put on their steering ...

A Better Than Remote Chance – More People Work from Home in Post COVID World

Published: 08/05/2020

By Matt Hines, VP of Marketing at CipherCloud & Neeraj Nayak, Sr. Product Marketing Manager at CipherCloudSummary: New research underlines the fact that more people will likely prefer to work from home, even when the pandemic passes. Security models that better address cloud apps, mobility an...

Upending Old Assumptions in Security

Published: 08/03/2020

By Wendy Nather, Head of Advisory CISOs at DuoEvery time you think you’ve figured out this risk management thing, something else happens to torpedo your hidden assumptions. Remember when we assumed that an IP address was a pretty good indicator of someone’s physical location and origin, so a netw...

Implementing a Vendor Assessment Platform? Tips for Long-Term Success

Published: 07/27/2020

By the Whistic TeamProactive vendor security is no longer just a buzzword tossed about in InfoSec conversations—it’s a must-have for cloud-based organizations to differentiate themselves from peers and vendors in a competitive landscape. As data security is working its way up the list of corporat...

Detect and Track Threats Through UEBA and Incident Governance

Published: 06/02/2020

By Ishani Sircar, Product Marketing Manager at CipherCloudThe Rise of the Unmanaged DevicesMost organizations are predicting an increased remote workforce and adoption of SaaS apps in the coming years. Remote work environments have led to a rapid adoption of data sharing and collaboration apps, B...

Mobile-Connect Controls for Secure Remote Working

Published: 05/12/2020

By Neeraj Nayak, Sr. Product Marketing Manager, CipherCloudEndpoint security, today, has emerged as one of the biggest cybersecurity concerns in the industry. Due to the worldwide shift to remote workforce model, we are witnessing two major trends in the industry - (a) adoption of SaaS applicatio...

Why is Cloud DLP the most important technology for SaaS apps?

Published: 05/07/2020

By Neeraj Nayak, Sr. Manager, Product Marketing at CipherCloudData Loss Prevention (DLP) is not a new concept in the market. DLPs have been an integral part of data security software for over a decade. DLP is defined as a set of tools or technology that can detect and classify sensitive content w...

Nine mandates to secure your remote workforce

Published: 04/22/2020

By Ishani Sircar, Manager, Product Marketing at CipherCloudAre We in a Cloud-First Environment?Let us look at a regular workday: A few updates on Slack, followed by emails on Microsoft Outlook, updating attendance on Workday, a few meetings with partners on Microsoft Teams, updating the status o...

Top 10 Audio/Video Conferencing Security Best Practices

Published: 04/22/2020

By Michael Born, Sr. Security Consultant at SecureSkyWith the recent shift of much of the global workforce to home office work environments, it’s a good time to revisit Audio/Video conferencing security best practices. In this blog we will highlight what we consider the Top 10 ways you can train ...

Coronavirus today and cybersecurity tomorrow

Published: 04/08/2020

By Jim Reavis, Co-Founder and CEO, CSAThe Black Swan event that is Coronavirus is a challenge for our times that we must win. Some may say that this pandemic should not be called a Black Swan event because we had the warning signs. However, the Internet is a great archive and you cannot find a ...

Network Security for the Cloud and Mobile Workforce

Published: 04/08/2020

By Etay Bogner, VP of Zero-Trust Products at ProofpointAn increasing number of enterprises today have made large-scale shifts to cloud-based IT resources by putting their applications in the cloud, subscribing to ready-to-use software-as-a-service (SaaS) applications, and supporting an expanding ...

7 Steps to Securing Your Remote Work Lifecycle in the Cloud

Published: 03/27/2020

By Martin Johnson, VP Marketing at PolyrizeCurrent global events and government mandates are forcing many organizations that have not, to date, encouraged remote work to suddenly allow their employees en masse to make a quick, often chaotic scramble for the exit and into the safety of their own h...

The Right Questions to Ask Your Vendors in Times of Large-Scale Remote Working

Published: 03/26/2020

By Elad Shapira, Head of Security, PanoraysIn the wake of coronavirus, companies are now applying immediate work-from-home policies. This sudden and massive change poses a set of new cybersecurity risks and is forcing security teams to take immediate action.One of these cybersecurity risks emanat...

Browse by Topic