Industry Insights

Read the latest cloud security news, trends, and thought leadership from subject matter experts.

Industry Insights
Six Key Characteristics of a Modern Secure Web Gateway
Published: 04/29/2021

This blog was originally published by Bitglass here.As we head into the second quarter of 2021 and mark a full year of remote work for many organizations, it is clear that the COVID-19 pandemic has accelerated digital transformation globally and changed the future of work — likely permanently. A ...

​2020 Hindsight and 2021 Foresight: Lessons Learned in the Work From Home Era
Published: 02/26/2021

By Lebin ChengOriginally posted by CloudVector It is hard to believe that it has already (or only?) been a year since a global pandemic forced organizations to adapt to the “new normal” of the work from home era. Given the 12-month milestone, now seems like the perfect time to stop and reflect on...

Remote working strategy: desktop virtualization or remote access?
Published: 02/22/2021

This blog was originally published on Wandera.com.Written by Alex Wells from WanderaCreating a technology roadmap for your business can feel like an impossible task as there is always something new on the horizon that you need to account for. It doesn’t help that analysts are trying to predict th...

2020 Hindsight and 2021 Foresight – Lessons Learned and Predictions for the Velocity of Business
Published: 02/01/2021

By Ravi Balupari, Founder & CTO, CloudVector This blog originally was published by CloudVectorThey say that hindsight is 2020, which has certainly been the case this year. For most organizations, 2020 orchestrated a fundamental shift to the way we work. The paradigm shift to work from home ha...

Letting The Right One In: A Preamble to Device Trust
Published: 11/26/2020

Written by Dave Lewis, Advisory CISO — Global at Duo I’m sorry, do I know you? A typical query that people may ask when confronted by an unknown person who walks up abruptly and starts asking them questions. Oddly though, this sort of response does not happen in many network environments. When ...

3 Reasons Why You Need to Include a VRM Platform in 2021
Published: 11/23/2020

This blog was originally published by Whistic here. 2020 has been an incredibly long year for all of us. Honestly, we’re ready to start afresh in 2021. As the past months have brought on some unique challenges for InfoSec teams, they have also revealed areas of opportunity and growth regarding ho...

What is cloud security? How is it different from traditional on-premises network security?
Published: 11/09/2020

Written by Ryan Bergsma, Training Director at CSACloud is also becoming the back end for all forms of computing, including the ubiquitous Internet of Things and is the foundation for the information security industry. New ways of organizing compute, such as containerization and DevOps are insepar...

The 10 Best Practices in Cloud Data Security
Published: 11/03/2020

By Branden Morrow from TokenExCloud Data Security Best Practices OverviewWhat exactly is cloud data security?Cloud security is the culmination of technologies and procedures that secure cloud computing environments against cybersecurity threats originating externally and internally. With cloud co...

Improving Data Security for SaaS Apps - 5 Key Questions every CISO needs to ask
Published: 10/06/2020

By Matt Hines, VP of Marketing at CipherCloud & Neeraj Nayak, Sr. Product Marketing Manager at CipherCloud Summary: The rapid uptake of game-changing SaaS applications has been transforming the way organizations do business long before COVD-19 emerged and the remote workforce exploded overn...

Understanding the Complexities of Securing a Remote Workforce
Published: 09/09/2020

By Sean Gray, Sr. Director InfoSec at Paypal and Co-Chair of the CSA Financial Services Working GroupWe have all witnessed sudden and stunning changes in how companies – big and small – operate in response to the challenges necessitated by COVID-19. Many have pivoted successfully, however there ...

SSO and the Road to Passwordless
Published: 09/01/2020

By Dave Lewis, Advisory CISO — Global at DuoWe’ve all heard the phrase “every journey starts with a single step.” While this might seem obvious on the face of it, we can often feel pressure to immediately arrive at our destination.Discussions around passwordless often are too simplistic or too co...

Can Passwordless Authentication Be Trusted?
Published: 08/17/2020

By J. Wolfgang Goerlich, Advisory CISO for Duo SecurityEvery new feature we introduce to our users is potentially a new tactic we provide our adversaries. When I was learning to drive, this happened with car steering wheel locks. Do you remember these? Big bars people would put on their steering ...

A Better Than Remote Chance – More People Work from Home in Post COVID World
Published: 08/05/2020

By Matt Hines, VP of Marketing at CipherCloud & Neeraj Nayak, Sr. Product Marketing Manager at CipherCloudSummary: New research underlines the fact that more people will likely prefer to work from home, even when the pandemic passes. Security models that better address cloud apps, mobility an...

Upending Old Assumptions in Security
Published: 08/03/2020

By Wendy Nather, Head of Advisory CISOs at DuoEvery time you think you’ve figured out this risk management thing, something else happens to torpedo your hidden assumptions. Remember when we assumed that an IP address was a pretty good indicator of someone’s physical location and origin, so a netw...

Implementing a Vendor Assessment Platform? Tips for Long-Term Success
Published: 07/27/2020

By the Whistic TeamProactive vendor security is no longer just a buzzword tossed about in InfoSec conversations—it’s a must-have for cloud-based organizations to differentiate themselves from peers and vendors in a competitive landscape. As data security is working its way up the list of corporat...

Detect and Track Threats Through UEBA and Incident Governance
Published: 06/02/2020

By Ishani Sircar, Product Marketing Manager at CipherCloudThe Rise of the Unmanaged DevicesMost organizations are predicting an increased remote workforce and adoption of SaaS apps in the coming years. Remote work environments have led to a rapid adoption of data sharing and collaboration apps, B...

Mobile-Connect Controls for Secure Remote Working
Published: 05/12/2020

By Neeraj Nayak, Sr. Product Marketing Manager, CipherCloudEndpoint security, today, has emerged as one of the biggest cybersecurity concerns in the industry. Due to the worldwide shift to remote workforce model, we are witnessing two major trends in the industry - (a) adoption of SaaS applicatio...

Why is Cloud DLP the most important technology for SaaS apps?
Published: 05/07/2020

By Neeraj Nayak, Sr. Manager, Product Marketing at CipherCloudData Loss Prevention (DLP) is not a new concept in the market. DLPs have been an integral part of data security software for over a decade. DLP is defined as a set of tools or technology that can detect and classify sensitive content w...

Nine mandates to secure your remote workforce
Published: 04/22/2020

By Ishani Sircar, Manager, Product Marketing at CipherCloudAre We in a Cloud-First Environment?Let us look at a regular workday: A few updates on Slack, followed by emails on Microsoft Outlook, updating attendance on Workday, a few meetings with partners on Microsoft Teams, updating the status o...

Top 10 Audio/Video Conferencing Security Best Practices
Published: 04/22/2020

By Michael Born, Sr. Security Consultant at SecureSkyWith the recent shift of much of the global workforce to home office work environments, it’s a good time to revisit Audio/Video conferencing security best practices. In this blog we will highlight what we consider the Top 10 ways you can train ...

Browse by Topic