<img src="//pixel.quantserve.com/pixel/p-_JKXxuL8SR7wu.gif?labels=_fp.event.Default" style="display: none;" border="0" height="1" width="1" alt="Quantcast">
blog-banner.jpg

the bitglass blog

Federal Court rules CASB agents, MDM agents & other spyware is wiretapping

By Nat Kausik  |  August 19, 2016 at 9:54 AM  | 

justice.jpeg

The Federal Appeals Court of the Sixth Circuit has ruled that the installation of agents* on end-user computing devices that monitor the private activity of users violates Federal laws restricting wire tapping. The essence of the ruling is that both the vendor and the entity that installed the agents are liable.

Read More

CASBs in Healthcare

By Rich Campagna  |  August 17, 2016 at 4:37 AM  | 

healthcare_casbs.jpgInitially a laggard in cloud adoption, the healthcare industry is now adopting public cloud applications en masse, with adoption of cloud based productivity apps like Office 365 and Google Apps. Adoption is up from 8% in 2014 to over 36% in 2015, with no signs of slowing down! This rapid change hasn't come without plenty of healthcare CISOs losing sleep - not only does Protected Health Information (PHI), an ever more attractive target for hackers, need to be protected, but the accessibility of the public cloud makes even inadvertent data leakage as easy as clicking the "share" button. Pair all of this with the fact that over 90% of healthcare professionals use BYOD and you have a serious disease without a cure.

Read More

How Strong is Your Encryption System?

By Kevin Gee  |  August 15, 2016 at 12:30 PM  | 

Pasted_image_at_2016_08_15_11_49_AM.pngMany Cloud Access Security Brokers and even cloud vendors themselves provide their own form of data encryption. But in today’s connected world, it is not enough to just secure the data.  How do you encrypt the data? Are you using industry standards? Do you maintain application functionality? Who maintains the keys? These are all questions that you should be thinking about when you wish to secure your data in the cloud.

Read More

anomaly detection: a critical security component

By Shalmali Rajadhyax  |  August 10, 2016 at 12:30 PM  | 

photo-1453799527828-cf1bd7b2f682.jpegAnomaly detection is an important component of any security solution. Based off of data at login and user activity in the application post login, a complete solution can provide real-time alerts and enable IT to enforce actions when an anomalous event is detected.

Read More