<img src="//pixel.quantserve.com/pixel/p-_JKXxuL8SR7wu.gif?labels=_fp.event.Default" style="display: none;" border="0" height="1" width="1" alt="Quantcast">
blog-banner.jpg

the bitglass blog

Deploying Office 365? Here's what you need to know.

By Salim Hafid  |  April 26, 2017 at 6:00 AM  | 

rawpixel-com-236143.jpgLate last year, our annual cloud adoption survey revealed that 34.8% of organizations worldwide have now deployed Office 365. This unprecedented growth in cloud productivity software is driven in part by the need for mobility, flexibility, and lower costs.

Read More

How One Company Thwarted an Office 365 Account Hijack with a CASB

By Chris Higgins  |  April 24, 2017 at 12:00 PM  | 

jay-wennington-2250.jpgIt is becoming more commonplace to hear of cyber attacks that compromise large sets of user data. Hackers have many different attack vectors in their arsenal. These range from complex attacks to simple phishing attacks yielding login credentials for a privileged user. Individuals in executive positions (CXO, VP, etc) and in IT operational roles are likely to have privileged access to information systems.

Read More

VCR flashing 12.00?

By Nat Kausik  |  April 21, 2017 at 8:56 PM  | 

vcr.jpg

If you are shopping for a CASB, this is an interesting question to ponder.

Read More

there may be a shark circling your data

By Jacob Serpa  |  April 5, 2017 at 11:00 AM  | 

Screen Shot 2017-04-03 at 4.15.32 PM.pngIn today’s business environment, cybersecurity remains a topic of great importance. As more companies migrate to the cloud, security concerns continue to evolve. While BYOD (bring your own device) affords employees more flexibility as they work from a multitude of devices, it also exposes data to nefarious parties in new ways. In the face of increasingly sophisticated cyber attacks, companies must learn and adapt or suffer the consequences.

Read More