Securing the Internet of Things: Connected Cars

By Ranjeet Khanna, Director of Product Management–IoT/Embedded Security, Entrust Datacard Establishing safety and security in automotive design goes far beyond crash test dummies. By 2022, the global automotive Internet of Things (IoT) market is expected to skyrocket to $82.79 billion – and manufacturers are racing to capitalize on this growing opportunity. While embedded computation and networking has […]

Read more...

CASBs and Education’s Flight to the Cloud

By Jacob Serpa, Product Marketing Manager, Bitglass Cloud is becoming an integral part of modern organizations seeking productivity and flexibility. For higher education, cloud enables online course creation, dynamic collaboration on research documents, and more. As many cloud services like G Suite are discounted or given to educational institutions for free, adoption is made even simpler. However, across the multiple use cases […]

Read more...

Saturday Security Spotlight: Malware, AWS, and US Defense

By Jacob Serpa, Product Marketing Manager, Bitglass Here are the top cybersecurity stories of recent weeks: —AndroRAT malware spies on Android users —Smart TVs easily hackable —BuckHacker tool finds unsecured data in AWS buckets —Octoly breach exposes social media stars’ personal data —Russian hackers target US defense contractors AndroRAT malware spies on Android users A new […]

Read more...

Unmanaged Device Controls, External Sharing, and Other Real CASB Use Cases

By Salim Hafid, Product Marketing Manager, Bitglass Many in the security industry have heard about CASBs  (cloud access security brokers) as the go-to solutions for data and threat protection in the cloud. But where exactly do CASBs slot in? If you already have a NGFW (next-gen firewall) or perhaps a secure-web-gateway-type solution, why invest in deploying a CASB? […]

Read more...

A Home for CASB

By Kyle Watson, Partner, Information Security, Cedrus Over the past 18 months, I’ve been working on CASB in some form or another including: —Educational architectural and technical videos —Request for Proposal (RFP) assistance —Pre-sales presentations and demos —Proof of Concepts (POCs) —Implementation —Operations build-out and transition I’ve discovered some interesting things working with vendors, clients, and […]

Read more...

Malware P.I. – Odds Are You’re Infected

By Jacob Serpa, Product Marketing Manager, Bitglass In Bitglass’ latest report, Malware P.I., the Next-Gen CASB company uncovered startling information about the rate of malware infection amongst organizations. Additionally, experiments with a new piece of zero-day malware yielded shocking results. Here is a glimpse at some of the outcomes. Nearly half of organizations have malware in one of their […]

Read more...

Agentless Mobile Security: No More Tradeoffs

By Kevin Lee, Systems QA Engineer, Bitglass Have you ever seen a “Pick two out of three” diagram? They present three concepts and force individuals to select the one that they see as the least important. The tradeoffs between convenience, privacy, and security serve as a perfect example of a “Pick two” situation for many mobile security solutions.  Industries […]

Read more...

Saturday Security Spotlight: Military, Apps, and Threats

By Jacob Serpa, Marketing Manager, Bitglass Here are the top cybersecurity stories of recent weeks: —Fitness app exposes military bases —Soldiers’ names revealed by app —Google Play filled with fake apps —Medical devices easily hacked —The internet of things creates risk for the enterprise Fitness app exposes military bases Strava, the creators of a fitness […]

Read more...

Why Next-Gen Firewalls Can’t Replace CASBs

By Joe Green, Vice President,/WW Solutions Engineering, Bitglass A security solution is only as good as the data it protects. Some solutions focus on data protection on the corporate network, others focus entirely on cloud data, and a select few enable security at access from any network. Next-gen firewalls (NGFWs) are the traditional solution for many […]

Read more...

EMV Chip Cards Are Working – That’s Good and Bad

By Rich Campagna, CEO, Bitglass For many years, credit card companies and retailers ruled the news headlines as victims of breaches. Why? Hackers’ profit motives lead them to credit card numbers as the quickest path to monetization. Appropriate data in hand and a working counterfeit card could be cranked out in seconds and used to […]

Read more...

Saturday Security Spotlight: Cyberwarfare and Cryptocurrency

By Jacob Serpa, Product Marketing Manager, Bitglass Here are the top cybersecurity stories of recent weeks: —Cyberattacks deemed a top threat to society —Hackers target data around the world —Poor app designs threaten countries’ infrastructure —Olympic Committee emails leaked by hackers —Half of UK firms fail to secure cloud —WiFi can be hacked to mine cryptocurrency […]

Read more...

Nine Myths of Account Takeover

By Dylan Press, Director of Marketing, Avanan Account takeover attacks are a nearly invisible tactic for conducting cyber espionage. Because these breaches can take months or years to detect, we are slowly discovering that this attack vector is much more common than we thought. The more we learn about new methodologies, the more we realize […]

Read more...

Cloud App Encryption and CASB

By Kyle Watson, Partner/Information Security, Cedrus Digital Many organizations are implementing Cloud Access Security Broker (CASB) technology to protect critical corporate data stored within cloud apps. Amongst many other preventative and detective controls, a key feature of CASBs is the ability to encrypt data stored within cloud apps. At the highest level, the concept is quite […]

Read more...

Saturday Morning Security Spotlight: Breaches and Intel

By Jacob Serpa, Product Marketing Manager, Bitglass Here are the top cybersecurity stories of recent weeks: —Data on 123 million US households leaked —Tech giants investing in healthcare technology —Intel chips contain security vulnerability —DHS suffers breach of over 247,000 records —Forever 21 finds malware in PoS systems Data on 123 million US households leaked Alteryx, an […]

Read more...

GDPR and the Art of Applying Common Sense

By Daniele Catteddu, Chief Technology Officer , Cloud Security Alliance On November 21, the CSA released the Code of Conduct for GDPR Compliance. This new document is part of CSA’s continuous effort to support the community with best practices that will help cloud providers and customers alike face the tremendous challenge of General Data Protection Regulation (GDPR) […]

Read more...

Cloud Access Security Brokers: Past, Present, and Future

By Jacob Serpa, Product Marketing Manager, Bitglass Leading cloud access security brokers (CASBs) currently provide data protection, threat protection, identity management, and visibility. However, this has not always been the case.  Since the inception of the CASB market, cloud access security brokers have offered a variety of tools and undergone a number of evolutions. For organizations to ensure that they are […]

Read more...

Saturday Morning Security Spotlight: Jail Breaks and Cyberattacks

By Jacob Serpa, Product Marketing Manager, Bitglass Here are the top cybersecurity stories of recent weeks: — Man attempts prison break through cyberattacks — Mailsploit allows for perfect phishing attacks — 1.4 billion credentials found in dark web database — Starbucks WiFi hijacks connected devices — Hackers target cryptocurrency employees for bitcoins Man attempts prison break through […]

Read more...