<img src="//pixel.quantserve.com/pixel/p-_JKXxuL8SR7wu.gif?labels=_fp.event.Default" style="display: none;" border="0" height="1" width="1" alt="Quantcast">
blog-banner.jpg

the bitglass blog

The View from RSA 2017

Cloud Security Requires Separation of Duties

Malware Waits for No CASB

CASB is Eating the IDaaS Market

AWS Support is Here

What's wrong with agents? Everything.

Enabling External Collaboration with a CASB

real-time agentless data protection

How Google Secures G Suite Data

In EMEA, It's the Year of the Cloud

2017 is here. Here's what infosec leaders expect.

In Healthcare, mobility is everything

Replacing MSFT Forefront TMG with a CASB

Limitations of Office 365 Data Loss Prevention (DLP)

Hackers Are Home For the Holidays

Agent-based CASB on Google Apps?

Cloud adoption is up again this year. What does that mean for you?

what's so special about a CASB: part five

Where does Salesforce platform encryption fall short?

what's so special about a CASB: part four

what's so special about a CASB: part three

Microsoft Teams vs Slack Security

Adding UEBA and Step-up 2FA to Cloud Apps

The Necessity of Secure File Sharing

Double-agent CASB?

At the Gartner Symposium, Office 365 looms large

denial, anger, bargaining, depression & acceptance...

DLP - need steak with the sizzle?

what's so special about a CASB: part two

The Data Blind Spot: Where O365 Security Falls Short

what's so special about a CASB: part one

who's viewing my docs at strange locations?

Ahead of Dreamforce, here's what you should know about Salesforce security

What is UEBA?

the yugo of CASB?

Moving to the cloud? Here's why you need cloud DLP.

Integrating a CASB with Premises DLP

Federal Court rules security agents on BYOD may constitute wiretapping

CASBs in Healthcare

How Strong is Your Encryption System?

anomaly detection: a critical security component

Where Office 365 Falls Short in Securing PHI

4 Risky Habits of BYOD Users

Capabilities Necessary for Complete Cloud Security

Closing the Cloud Security Gap with a CASB

CASB: Security AND Management

Should your Investment Firm fight for you?

The Evolution of Cloud Security Perceptions

Where to Start with CASB Policies?

Five Ways to Tell if Your CASB will Fly

8 Questions to Ask When Evaluating a CASB

6 ways MDM can be misused

"Cadillac of CASB" 0 - deploy in 2.4 months

4 Tips for Encrypting Google Drive

Securing Office 365 with a Cloud Access Security Broker

Adopting MDM may be sacrificing more privacy than employees realize

"the cadillac of CASB"

the ultimate trojan horse?

"Security is now a business issue"

Sandwiches, Prescription Drugs & CASB

who uses unmanaged devices?

Bluecoat + Symantec: dinosaurs' union?

How Enterprise Mobility Management (EMM) Can Annoy Users

How Cloud Data Leaks

Can cloud apps be as secure as premises-based apps?

Is OEM Software a Good Idea?

IT purchase decisions made easy

Peak MDM has come & gone, enter CASB

Bitglass Q&A: Securing Mobile with a CASB

how to start securing office 365

Bitglass report: BYOD availability outpaces adoption

Are AirWatch Customers Dummies?

Praise for secure native email on Blackberry

How Bitglass' Reverse Proxy Enables Full Application Robustness

Marketing Matters...

The best B2B digital marketing campaigns of 2016

Controlling External File Sharing with a CASB

Bitglass adds Help Desk Diagnostics

The Bitglass Story

The Tail wags the Dog?

The View from RSA 2016

Project Cumulus: Hackers' Unusual Activity

Security and Compliance for Healthcare

A look back at the original Where's Your Data experiment

On the Dark Web, Hackers Eager to Share Tactics

Apple Debate Highlights Importance of Data Encryption

Credentials spread like wildfire in Project Cumulus data experiment

Unmanaged Device Access Control with a CASB

Encrypting Salesforce in 5 Minutes with a CASB

Improving Office 365 Performance with a CASB

How Bitglass Works

Why do hackers target healthcare data?

One in three Americans were affected by healthcare breaches in 2015

Cloud Security Responsibilities: The Wall Street Journal Test

Who Should Use Bitglass?

Cloud adoption in regulated vs unregulated industries

Education is moving to the cloud faster than any other industry

"Where's Your Data?" Experiment

Cloud adoption on the rise. Many don't follow security best practices

Secure A Cloud App in 5 Minutes

The Whole Enchilada (aka CASB)

77% Plan To Increase Mobile & Cloud Security Spend

Nasdaq: Cloud & Mobile are Inseparable...

The Four Pillars of CASBs

Cloud First, Security Now

Survey: Access Permissions Are IT Leaders' Biggest Concern

The Dangers of Proprietary CASB Architectures

Tokenization for Cloud like Chocolate for Dogs?

CASBs Hit the Mainstream!

SaaS Encryption Gotchas

And the Next Major Data Breach is...

Concerned About CISA? Encrypt Data Before It Hits The Cloud

CASBs: A better approach to cloud encryption

Top Priorities in Higher Ed: Protect Research, Enable Cloud & Mobile

Catch & Release Phishing

Office 365 Security - Data Leakage Prevention

How to Patent a Phishing Attack

Office 365 Security - Mobile Data Protection

BYOD Security 2015: Rise of the Employees

Office 365 Security - Identifying Suspicious User Behavior

Office 365 Security - Controlling Identity Sprawl

The Definitive Guide to Office 365 Security

CASBs Explained! Comic Strip Edition

Boardroom Heroes: Part 3 (Finale) – CASBs

Boardroom Heroes: Part 2 – Prepping for 2016’s User Revolt

BYOD Done Right

2015 Cloud Adoption Report - Behind the Stats

Boardroom Heroes: Part 1 – The Rise Of IT Security

Security Is Everyone's Responsibility

The Spider-Man CASB!

Firsthand Account: Employee BYOD Fears

This is How Cloud Data Leaks

Why Must I "Trust" My Employer to Keep My BYOD Personal Info Private?

Is Your Company Still Trying to Use MDM for BYOD?

EMM & BYOD - Oil and Water!

‘It’s An Adoption, Not A Roll Out’

Preventing Man-in-the-Cloud Attacks with a CASB

Your Data or Your Life! MDM Installation Warning

How Bitglass Provides Searchable, Sortable Encryption for Cloud Apps

MDM is Dead Part II

2015 BYOD Security Survey - Calling all IT security Pros

Salesforce "Platform Encryption"

Delivering Industry's First & Only Complete CASB

The Art of (Cyber) War

Hybrid Architecture Cloud Access Security Brokers

Full-strength, searchable cloud encryption

MDM is Dead, According to End-Users

Demystifying the Myths Surrounding CASBs

Diluted Encryption

Mobile Security - Insider Threats, Swift Key & Zombie Apps

MDM: The Patriot Act of BYOD Programs

Making Security Invisible

6 Security Tips From the Gartner Security & Risk Management Summit

Those Who Can, Do;

The Many Faced Cyber Criminal

Can MDM Secure the Mobile Cloud?

Future of the Data Center Firewall - Introducing the Cloud-tuple

Gartner Insight on CASBs - Proxy vs API Approaches

Healthcare Duped By “Spellcheck” Phishing Attack Again?

How Bitglass Authentication Works

Lifehack: 4 Things To Stop Doing when it comes to O365 Security

Teaming Up With FS-ISAC In The War Against Cyber Crime

Innovation Happens in So Many Ways

Here's How Nasty "Rombertik" Malware Evades Detection

HIPAA-Compliant BYOD After the Honeymoon

ShadowIT - The Blind leading the Blind?

"White-Hat Malware"

Notes from RSA

You…Shall…Not…Pass!

Think Like a Hacker

Where's Your Data? Experiment

Cloud Access Security Brokers: What Gartner Is Saying

Global Warming to Put an End to Cloud Adoption

BYOD Security - The "Managed vs. Unmanaged" Device Strategy

Premera Breach Shows Striking Similarities to Anthem

Cloud Security Alliance CEO Jim Reavis talks cloud adoption

Security Still Cloud's Achilles Heel

Swiss Cheese and MDM: The Fallacy of Cross Platform Support

Adopt The ‘Assume Mentality’ When it comes to Breaches

Security's House Of Cards

Criminals Can Get Into Your Network Without Hacking You

The Encryption Bandaid

What The Anthem Breach Means For Healthcare Security

The Mobile Barn Door

Cutting Out The Security Blind Spots

"You will get a Data Breach, Period"

Limit the Damage - Catch Breaches Early

The Truth About Encryption

The Great Security Masquerade

Anytime, Anywhere Healthcare Data Access: Worth The Risk, or Not?

The Intricacies of Insider Threats

How Does an "Outsider" Become an "Insider" Threat?

How To Protect Your Data From Wall St. Lingo, Phony Emails & Tor

Tiny Budgets & Big Responsibility – Equipping Your Cyber Security Army

Where's Your Data?

The Human Factor Of Data Security

What "The Walking Dead" and IT Security Have In Common

What’s Lurking On Your Trusted Device?

5 Tips For Healthcare Data Security

What California’s Data Breach Report Means For Healthcare

The Nightmare Before Bitglass

What Did Data Say To The Device? - "It's Not You, It's Me"

The Deadliest Warrior – BYOD Edition - MDM vs. CASB

California’s New “Gold Rush” – Data Protection

Protecting The Black Market’s Hottest Commodity – Medical Data

7M Dropbox Passwords Breached - What It Means for the Enterprise

SaaS Holes - Part 4: Lost Mobile Devices

SaaS Holes - Part 3: Data Leakage

SaaS Holes - Part 2: Suspicious Activity

Here's How Bay Cove Human Services Eliminated MDM and IAM

SaaS Holes - Part 1: Identity Sprawl

Cloud and Trust: A Match Made In IT Heaven

Taming Shadow IT with Bitglass Cloud Discovery

Does Your Salesforce Sandbox Need a Cover?

Malware Stealing Salesforce Data

How to Leverage Legacy DLP for Cloud Apps (Users will Hate You)

Cloud Access Security Brokers - Wrap-Up

Cloud Access Security Broker Proxy Architectures

CASBs: Protecting Data "On the Network"

Protecting Data "On the Device" with a CASB

Smartphone Kill Switch Won't Help BYOD Security

Protecting Data "At Access" with a CASB

Protecting Data "In the Cloud" with a CASB

Total Data Protection with CASBs

CASBs Must Balance IT Needs and Employee Demands

Wait, Aren't Cloud Apps Already Secure?

The Definitive Guide to Cloud Access Security Brokers

You are Wasting Your Time on Cloud Security

Who Leaked that Spreadsheet onto Dropbox?

Here's why IT is resistant to change

Public Cloud Flexibility Meets Private Cloud Security

Dogfooding at Bitglass: We Secure Our Own Corporate Data

Data Security is the New Data Security

Incinerating Smartphones with Sensitive Data

Is User Experience The Most Important Aspect of BYOD Security?

Microsoft Signals the Cloud Adoption Tipping Point

4 Security Functions You Need When Deploying Salesforce

Last Minute Mother's Day Gift Idea: Cloud Security

More IT Security Pros Need to Think Like This Guy

Confessions of 100 Chief Information Security Officers

Who Knew BYOD Meant So Many Things?

The Cost of PHI on Employee Mobile Devices? $2,000,000+

BYOD or BYOB?

Here's what you need to know about securing Office 365

The most important aspect of Cloud Security? Mobile.

Next-Gen BYOD Requirement 6 of 6: Can I Get Some Privacy in Here?

Next-Gen BYOD Requirement 5 of 6: Be a People Pleaser

The Ultimate Cheat Sheet for Google Apps Security

Next-Gen BYOD Requirement 4 of 6: It's All About the Benjamins

Information-centric cloud security

The Perils of BYOD: Lose Your Phone, Get Fired!

Next-Gen BYOD Requirement 3 of 6: Clouds on the Horizon

WSJ: Privacy & the Rise of the Two Phone Employee

NSA announces "Activity-Based Marketing Platform"

Next-Gen BYOD Requirement 2 of 6: I want more

Do employees deserve privacy?

Next-Gen BYOD Requirement 1 of 6: It’s all about data

A Knife Fight in a Phone Booth: How we got from BY-Oh-NO to BYOD

Here's Why Your BYOD Program Will Fail

Dump your MDM! BYOD strategies that work

Tug of War! Security vs. Convenience

Users, IT, and BYOD Security: Can't We All Just Get Along?

Cloud Security and Employee Privacy: Why It Matters

BYOD Security: When MDM Doesn't Hit the Spot

Cloud Security in a Box: Put the genie back in the Bottle

The Perils of BYOD Security: Change Jobs, Get Your Phone Wiped Clean!

What CIOs are Concerned About, After Hearing NSA-Cyber-Spying News

Mobile and Cloud Security Predictions for 2014

The Most Disruptive Technology Yet - How IT is Handling It

This is how long it takes to crack your CEO’s smartphone code…

Offense Wins Games, Defense Wins Championships

Happy Halloween from Bitglass!

People-Centric SaaS Security

SaaS Security Doesn't Stop at the Cloud Infrastructure

Report: Cloud Apps Are Useless

Leaky Bucket Effect on Your BYOD & SaaS Security Policies

Welcome Michael Leigh!

Is Mobile Application Management Dead On Arrival?

Learnings from Week 2 of the Bitglass Beta: No Dragnets Please!

Login and Logout but Nothing in Between - SaaS Application Visibility

Bitglass Beta Week 1: Users Love Mobility, Hate MDM

Does Your Firewall Cover Your SaaS?

Your Data Has Left The Building