Securing the Internet of Things: Devices & Networks

By Ranjeet Khanna, Director of Product Management–IoT/Embedded Security, Entrust Datacard The Internet of Things (IoT) is changing manufacturing for the better. With data from billions of connected devices and trillions of sensors, supply chain and device manufacturing operators are taking advantage of new benefits. Think improved efficiency and greater flexibility among potential business models. But as […]

Read more...

Zero-Day in the Cloud – Say It Ain’t So

By Steve Armstrong, Regional Sales Director, Bitglass Zero-day vulnerabilities are computer or software security gaps that are unknown to the public – particularly to parties who would like to close said gaps, like the vendors of vulnerable software. To many in the infosec community, the term “zero-day” is synonymous with the patching or updating of systems. […]

Read more...

Saturday Security Spotlight: Tesla, FedEx, & the White House

By Jacob Serpa, Product Marketing Manager, Bitglass Here are the top cybersecurity stories of recent weeks: —Tesla hacked and used to mine cryptocurrency —FedEx exposes customer data in AWS misconfiguration —White House releases cybersecurity report —SEC categorizes knowledge of unannounced breaches as insider information —More Equifax data stolen than initially believed Tesla hacked and used […]

Read more...

Securing the Internet of Things: Connected Cars

By Ranjeet Khanna, Director of Product Management–IoT/Embedded Security, Entrust Datacard Establishing safety and security in automotive design goes far beyond crash test dummies. By 2022, the global automotive Internet of Things (IoT) market is expected to skyrocket to $82.79 billion – and manufacturers are racing to capitalize on this growing opportunity. While embedded computation and networking has […]

Read more...

CASBs and Education’s Flight to the Cloud

By Jacob Serpa, Product Marketing Manager, Bitglass Cloud is becoming an integral part of modern organizations seeking productivity and flexibility. For higher education, cloud enables online course creation, dynamic collaboration on research documents, and more. As many cloud services like G Suite are discounted or given to educational institutions for free, adoption is made even simpler. However, across the multiple use cases […]

Read more...

Saturday Security Spotlight: Malware, AWS, and US Defense

By Jacob Serpa, Product Marketing Manager, Bitglass Here are the top cybersecurity stories of recent weeks: —AndroRAT malware spies on Android users —Smart TVs easily hackable —BuckHacker tool finds unsecured data in AWS buckets —Octoly breach exposes social media stars’ personal data —Russian hackers target US defense contractors AndroRAT malware spies on Android users A new […]

Read more...

Unmanaged Device Controls, External Sharing, and Other Real CASB Use Cases

By Salim Hafid, Product Marketing Manager, Bitglass Many in the security industry have heard about CASBs  (cloud access security brokers) as the go-to solutions for data and threat protection in the cloud. But where exactly do CASBs slot in? If you already have a NGFW (next-gen firewall) or perhaps a secure-web-gateway-type solution, why invest in deploying a CASB? […]

Read more...

A Home for CASB

By Kyle Watson, Partner, Information Security, Cedrus Over the past 18 months, I’ve been working on CASB in some form or another including: —Educational architectural and technical videos —Request for Proposal (RFP) assistance —Pre-sales presentations and demos —Proof of Concepts (POCs) —Implementation —Operations build-out and transition I’ve discovered some interesting things working with vendors, clients, and […]

Read more...

Malware P.I. – Odds Are You’re Infected

By Jacob Serpa, Product Marketing Manager, Bitglass In Bitglass’ latest report, Malware P.I., the Next-Gen CASB company uncovered startling information about the rate of malware infection amongst organizations. Additionally, experiments with a new piece of zero-day malware yielded shocking results. Here is a glimpse at some of the outcomes. Nearly half of organizations have malware in one of their […]

Read more...

Agentless Mobile Security: No More Tradeoffs

By Kevin Lee, Systems QA Engineer, Bitglass Have you ever seen a “Pick two out of three” diagram? They present three concepts and force individuals to select the one that they see as the least important. The tradeoffs between convenience, privacy, and security serve as a perfect example of a “Pick two” situation for many mobile security solutions.  Industries […]

Read more...

Saturday Security Spotlight: Military, Apps, and Threats

By Jacob Serpa, Marketing Manager, Bitglass Here are the top cybersecurity stories of recent weeks: —Fitness app exposes military bases —Soldiers’ names revealed by app —Google Play filled with fake apps —Medical devices easily hacked —The internet of things creates risk for the enterprise Fitness app exposes military bases Strava, the creators of a fitness […]

Read more...

Why Next-Gen Firewalls Can’t Replace CASBs

By Joe Green, Vice President,/WW Solutions Engineering, Bitglass A security solution is only as good as the data it protects. Some solutions focus on data protection on the corporate network, others focus entirely on cloud data, and a select few enable security at access from any network. Next-gen firewalls (NGFWs) are the traditional solution for many […]

Read more...

EMV Chip Cards Are Working – That’s Good and Bad

By Rich Campagna, CEO, Bitglass For many years, credit card companies and retailers ruled the news headlines as victims of breaches. Why? Hackers’ profit motives lead them to credit card numbers as the quickest path to monetization. Appropriate data in hand and a working counterfeit card could be cranked out in seconds and used to […]

Read more...

Saturday Security Spotlight: Cyberwarfare and Cryptocurrency

By Jacob Serpa, Product Marketing Manager, Bitglass Here are the top cybersecurity stories of recent weeks: —Cyberattacks deemed a top threat to society —Hackers target data around the world —Poor app designs threaten countries’ infrastructure —Olympic Committee emails leaked by hackers —Half of UK firms fail to secure cloud —WiFi can be hacked to mine cryptocurrency […]

Read more...

Nine Myths of Account Takeover

By Dylan Press, Director of Marketing, Avanan Account takeover attacks are a nearly invisible tactic for conducting cyber espionage. Because these breaches can take months or years to detect, we are slowly discovering that this attack vector is much more common than we thought. The more we learn about new methodologies, the more we realize […]

Read more...

Cloud App Encryption and CASB

By Kyle Watson, Partner/Information Security, Cedrus Digital Many organizations are implementing Cloud Access Security Broker (CASB) technology to protect critical corporate data stored within cloud apps. Amongst many other preventative and detective controls, a key feature of CASBs is the ability to encrypt data stored within cloud apps. At the highest level, the concept is quite […]

Read more...

Saturday Morning Security Spotlight: Breaches and Intel

By Jacob Serpa, Product Marketing Manager, Bitglass Here are the top cybersecurity stories of recent weeks: —Data on 123 million US households leaked —Tech giants investing in healthcare technology —Intel chips contain security vulnerability —DHS suffers breach of over 247,000 records —Forever 21 finds malware in PoS systems Data on 123 million US households leaked Alteryx, an […]

Read more...

GDPR and the Art of Applying Common Sense

By Daniele Catteddu, Chief Technology Officer , Cloud Security Alliance On November 21, the CSA released the Code of Conduct for GDPR Compliance. This new document is part of CSA’s continuous effort to support the community with best practices that will help cloud providers and customers alike face the tremendous challenge of General Data Protection Regulation (GDPR) […]

Read more...