Next-Gen CASB Blog

Improved Team Collaboration with G Suite, Powered by Bitglass & Okta

"Out-of-band Real-time API Security"

Partners in Cloud: Bitglass | Zscaler

Bitglass Security Spotlight: Vulnerability Found on TikTok Platform

The Rise of Insider Threats in Verizon’s DBIR

Glass Class: Cloud Security Priorities 2020

Bitglass: Deck the Cloud

Major metro cuts firewall spend!

Bitglass Security Spotlight: Cancer Centers Halted Due to Cyberattack

The Financial Matrix: Bitglass’ 2019 Financial Breach Report

Bitglass SASE wins Global 2000 enterprise

Bitglass API Gateway Encryption

Glass Class: Securing G Suite

Bitglass Security Spotlight: Domains Used to Target Microsoft Users

What a Night at Ignite

The Ins and Outs of Securing BYOD

Bitglass Security Spotlight: Surveillance Vulnerability Impacts Ring

A Perfect Intermediary: APIs

Glass Class: Why Integration Matters for Cloud Security

Bitglass Security Spotlight: Microsoft Users Attacked via Phishing

Cloud Adoption 2019: A for Adoption

Securing Data Beyond The Corporate Walls

Glass Class: Where to Detect Malware

The Four Pillars of CASB: Visibility

Bitglass Security Spotlight: 20 Million Russian Citizens Exposed

Glass Class: Integrating CASB with DLP

Appeasing the Oasis of Unknown: Shadow IT Discovery

Bitglass Security Spotlight: A Step-By-Step Guide To Breach Instagram

Glass Class: How to Detect Malware

The Cloudfathers: The Latest Cybersecurity Findings For Fortune 500

The Four Pillars of CASB: Identity

Bitglass Security Spotlight: 419 Million Facebook Users Exposed

Glass Class: The ZScaler and Bitglass Integration

Digital Transformation, Cybersecurity, Cloud Apps, and Cloud Security

An Old Dog With New Tricks

The Four Pillars of CASB: Threat Protection

Bitglass Security Spotlight: Google Issues Warning For 2 Billion Users

Glass Class: Protecting Unmanaged Device Access to Cloud Apps

The Four Pillars of CASB: Data Protection

Bitglass Security Spotlight: iPhones Susceptible to a Hack via Text

The Black Hat Experience with Bitglass

Glass Class: Three Essential Requirements for Securing IaaS

Bitglass Sales Kick-Off – Fun, Concise, and Effective!

Bitglass Security Spotlight: Capital One Suffers Data Breach Affecting 100 Million Customers

Cloud Security Posture Management: Why You Need It Now

Encrypt your Cloud Data!

Glass Class: The Searchable Log of All Conversation and Knowledge

First-gen CASB goes phishing again

Securing G Suite with Bitglass

Bitglass Security Spotlight: TrickBot Malware Continues to Breach Millions of Emails

Can Private Attorneys Help Prevent Cybercrime?

Guardians of the Cloud: The Latest Security Findings

Global Visibility into your SaaS Applications

Bitglass Security Spotlight: EA Origin Leaves the Data of 300 Million Accounts Exposed

Bitglass at AWS re:inforce 2019: The Next-Gen CASB

Ensuring Data Security in Slack

Bitglass Security Spotlight: Canada’s Largest Credit Union Suffers Massive Data Breach

Sharing PHI, PII, and PCI in the Cloud?

Glass Class: Securing Patient Data in the Cloud

The Newspaper Test

Bitglass Security Spotlight: Quest Diagnostics Patients’ Personal Information at Risk

First American Breach Retrospective

Glass Class: Mitigating Risk before Shadow IT

What is a CASB and How Do You Even Say It?

Bitglass Security Spotlight: G Suite User Passwords Stored in Plaintext

Betting Big on CASB: Bitglass at Evolve

Verizon’s 2019 DBIR Documents over 2,000 Breaches

Monster-Sized Breaches Spell Disaster for the Enterprise

Bitglass Security Spotlight: 80 Million Personal Records Exposed

Glass Class: The AWS Security Quest

Bitglass Security Spotlight: Ransomware Infects Aebi Schmidt

Financial Services: Counting on CASBs

Bitglass Security Spotlight: Facebook stores countless passwords in plaintext

Bitglass Rocks the CASB at Oktane '19

Prying Eyes Inside the Enterprise: Bitglass' Insider Threat Report

Eat your own dog food?

Securing Marketo

Bitglass Security Spotlight: Dow Jones, TurboTax, and Indane Data Breaches

Misconfiguration Monitoring 101

Bitglass at RSA 2019: CASBs and Cocktails

Bitglass Security Spotlight: 500px, Card Dumps, and UW Medicine

From coin-flip DLP to Next-Gen CASB

The Many Benefits of a Cloud Access Security Broker

"Collection #1" Data Breach

Cloud Security Needs in Higher Education

Bitglass Security Spotlight: Apple, Cryptocurrency, and Mass Breaches

Healthcare Breaches and the Rise of Hacking and IT Incidents

CSPM for AWS: Monitoring Misconfigurations in IaaS

How to Prioritize Cloud Security in 2019

Bitglass Security Spotlight: Google, GDPR, & Homeland Security

Unsanctioned Apps in the Enterprise

The Perfect Sales Kickoff

Cloud Access Security Brokers: 2020

The New Outlook: AJAX-VM

Finance: A Cloud Security Investigation (CSI)

Bitglass Security Spotlight: Breaches Expose Millions of Emails, Texts, and Call Logs

Healthcare: A Cloud Security Investigation (CSI)

Education: A Cloud Security Investigation (CSI)

Moving Day!

Bitglass Security Spotlight: DoD, Facebook, & NASA

Bitglass Rising: 2018 Recap

Office 365 Security Licensing and Pricing - 2019 Edition

Cornerstone Capabilities of Cloud Access Security Brokers

Bitglass: A One-Way Trip to Secureland

SaaS Apps And the Need for Specialized Security

Bitglass Security Spotlight: Quora and Healthcare Breaches

Rocks, Pebbles, Shadow IT

Reflections from Gartner's IAM Summit 2018

Bitglass Security Spotlight: Financial Services Facing Cyberattacks

Bitglass: Securing Smartsheet from Day One

CASB tales from the darkside...

Bitglass and the Rise of Cloud Security Posture Management

How to Select a CASB According to Gartner

How to Do the Impossible and Secure BYOD

Using third-party network devices or solutions on Office 365 traffic

Bitglass Security Spotlight: US Government Breaches Abound

Keeping Your Boat Afloat with a Cloud Access Security Broker

Bitglass Named a Leader in Gartner's 2018 Magic Quadrant for CASB

The Ins and Outs of Insider Threats

Office 365 and the Long Tail of SaaS Apps at Gartner Symposium

Bitglass: Golden Bridge Winner and SINET 16 Innovator

The Next-Gen CASB: Securing Office 365 and Outlasting the Competition

Bitglass Security Spotlight: Uber, Apollo, & Chegg

MSFT Azure AD Conditional Access vs CASB

Data Breaches on the Rise in Financial Services

Cloud Access Security Brokers and Cyber Security Chicago

Bitglass Security Spotlight: Veeam, Mongo Lock, & Password Theft

How to Protect Data in a BYOD World

The Faces Behind the Next-Gen CASB: Deepika Verma

Bitglass Security Spotlight: Atlas Quantum & the 2020 Census


The Sales Learning Curve

Bitglass: Securing Any App at the Drop of a Hat

Differentiating in a Crowded CASB Marketplace

Want to Secure Salesforce? No Problem!

Bitglass Security Spotlight: Malware Evolving & Reddit Breached

Fixing Your Mis-Deployed NGFW

In Europe, Cloud Is the New Default

7 Reasons Why Proxy-based CASBs are Required for Office 365

Bitglass Security Spotlight: Yale, LifeLock, & SingHealth

All hat, no cattle

Pwned Passwords – Have Your Credentials Been Stolen?

At Black Hat 2018, Cloud Security Comes to the Fore

The holy grail: threat protection on any device

Missed Connections at Black Hat

The Wall Street Journal Names Bitglass the Top Tech Company

The Faces Behind the Next-Gen CASB: Jessica Hartono

Bitglass Security Spotlight: Rakhni Trojan Evolving

RSA Asia Pacific & Japan: Cloud Is Here to Stay

The Faces Behind the Next-Gen CASB: Sowmy Krishnakumar

Cloud Security in 2018: What You Need to Know

The Faces Behind the Next-Gen CASB: Jen Perisho

Bitglass Security Spotlight: Tesla, Lazarus Group, & Exactis

US CLOUD Act Drives Adoption of Cloud Encryption

The Faces Behind the Next-Gen CASB: Michael Tamayo

Bullshit Patents Scare the Best Engineers...

RFA Secures Office 365 with the Next-Gen CASB

Bitglass Security Spotlight: T-Mobile, Coca-Cola, & Ticketfly

California's CCPA Brings EU Data Privacy to the US

The Faces Behind the Next-Gen CASB: Daniel Mai

CASB & the Internet of Things

The Faces Behind the Next-Gen CASB: Radhika Khatod

Ntooitive Chooses Bitglass for G Suite Security

Bitglass Security Spotlight: Google, SynAck, & Drupal

InfoSec 2018: Insights from the Next-Gen CASB

Northwestern Partners with Bitglass for Data Security

CASBs and Crabs in Our Nation's Capital

EU GDPR vs US: What Is Personal Data?

The Faces Behind the Next-Gen CASB: David Shephard

Bitglass: The High-Oktane CASB

Cloud Security Trailing Cloud App Adoption in 2018

Bitglass Security Spotlight: Twitter, PyRoMine, & Stresspaint

Regulatory Compliance in the Cloud: What, Why, How

The Faces Behind the Next-Gen CASB: Eco Willson

Shield or Fig Leaf?

The Next-Gen CASB Takes Evolve 2018 by Storm

AJAX-VM Strikes Again!

The Faces Behind the Next-Gen CASB: Kevin Lee

Bitglass Security Spotlight: LinkedIn, Vector, and AWS

How to Surf the Tidal Wave of SaaS Apps: A CASB Story

How ChromeOS Dramatically Simplifies Enterprise Security

Cambridge Analytica for Corporate SaaS?

Microsoft Workplace Join Part 2: Defusing the Security Timebomb

Emperors sans clothing...

Saturday Security Spotlight: Even More Leaks and Breaches

Microsoft Workplace Join Part 1: The Security Timebomb

The Next-Gen CASB at RSA 2018

Majority of Australian Data Breaches Caused by Human Error

Saturday Security Spotlight: Facebook, IoT, and AI

Are Traditional Security Tools Dead?

One Simple Way to Avoid 57% of Breaches

Surprise Apps in Your CASB PoC

Come #RockTheCASB with Bitglass at RSA 2018

Saturday Security Spotlight: Walmart, Leaks, and Slingshot

Mobile Security in 2018 – It's Time to Evolve


#delete Facebook, MDM-agent, CASB-agent ..

Orbitz: Why You Can't Secure Data in the Dark

The Case for CASB: Healthcare

Saturday Security Spotlight: Cryptomining, AWS, and O365

Australia's First OAIC Breach Forecasts Grim GDPR Outcome

What You Should Know When Moving to Office 365

Shadow IT and the End of the Endless Race

UK Banking Giant Goes Bitglass...

Your Data Is Still Leaving the Building

The Early Bird Gets the Virus

Saturday Security Spotlight: Tesla, FedEx, & the White House

Some cures are worse than the disease...

Are Healthcare Breaches Down Because of CASBs?

Where have all the CASBs gone?

You Are the Weakest Link – Goodbye

A Tale of Two CASBs

Next-Gen CASB vs First-Gen CASB

Zero-Day in the Cloud – Say It Ain't So

Saturday Security Spotlight: Malware, AWS, and US Defense

CASBs and Education's Flight to the Cloud

Unmanaged Device Controls, External Sharing, and Other Real CASB Use Cases

Malware P.I. – Odds Are You're Infected

Do CASBs and Cloud SWGs Compete?

Saturday Security Spotlight: Military, Apps, and Threats

Why Was the First CASB Gartner Magic Quadrant Published in 2017?

Why Next-Gen Firewalls Can't Replace CASBs

Zero-day CASB In Action

free software is like a free puppy...always

Agentless Mobile Security: No More Tradeoffs

EMV Chip Cards Are Working - That's Good and Bad

Saturday Security Spotlight: Cyberwarfare and Cryptocurrency

Time to Firewall Zero?

Lessons from the Next-Gen CASB's Sales Kickoff

Securing the Enterprise for Five Years – Happy Birthday, Bitglass!

Saturday Morning Security Spotlight: Breaches and Intel

What 2018 Brings for the CASB Market

Bitglass – Elevating Cloud Security in 2018

Protecting our Children's Identities with Next-Gen CASB

The Twelve Days of Bitglass

Turns out everyone has budget for a CASB

500M Breached Records - Preventable with a Next-Gen CASB

The Ins and Outs of Shadow IT

Saturday Morning Security Spotlight: Jail Breaks and Cyberattacks

Bitglass Rising: 2017 and Beyond

Next-Gen CASB: An ounce of prevention worth a pound of cure

Bitglass the Sole Visionary in CASB Gartner Magic Quadrant 2017

Private App Cloud Migration Requires CASB

The Robots are Here!

Cloud Access Security Brokers: Past, Present, and Future

Saturday Morning Security Spotlight: Apple, Breaches, and Leaks

Insider Threats, Machine Learning, and the Next-Gen CASB

Mission Impossible: Rogue Cloud Apps

Can a CASB Thwart the Uber Hack?

CASBs in K12: Agents Need Not Apply

Reflections: Gartner Symposium Barcelona

Zero-Day Read-Only Cloud App Protection

Saturday Morning Security Spotlight

Is 2018 the End of the API-Only CASB?

Next-Gen CASB: Zero-Day Protection

Exact Match Cures Healthcare's DLP Woes

CASBs and the Long Tail of SaaS

Identity and Authentication in a BYOD World

Security Rundown: Bad Rabbit, Malware-laden docs, and more

Avoid a Breach: 5 Tips to Secure Data Access

Office 365 Security Licensing Demystified

Secure Mobility Without MDM Headaches

CASB For Hire

Agentless CASB, FTW

CASB: Come for O365, Stay for Any App

Data Games: Security Insights from the Experts

CASBs: Top of the Class in Higher Ed

Second Gen CASBs Take the Lead

Reaching HIPAA Compliance With Bitglass

The Great CASB: Part Four

EU: Companies Lack Unilateral Right to Monitor Employees

Reflections: Gartner Catalyst

Bitglass Survey: 30% Take over 24 Hours for Breach Response

Datawatch: Beware of Careless Insiders

The Great CASB: Part Three

The Great CASB: Part Two

The Rise of the CASB

The Great CASB: Part One

Verizon Breach: How CASB Encryption Can Protect Your Data

Agentless CASB Accelerates Ransomware Disaster Recovery

Glass Class: The Malware Maze

passing the baton...

Gartner: CASBs Still Reign as Top Security Tech

Backdoor for Malware?

Are Your Sync Clients Really Safe?

Bitglass Top CASB on CBInsights

Fast and Frenzied Cloud Adoption

CASB, no bull

The cloud is rough on legacy security...

Malware: Painting a Picture Part 2

Secure Data Lakes?

GDPR Waits for No Company

Ransomware 101

Malware: Painting a Picture

AirPods and CASBs

repeal and replace

O365 Native Security - Wanna get away?

CASB RFP: Questions to ask when securing the cloud

Deploying Office 365? Here's what you need to know.

How One Company Thwarted an Office 365 Account Hijack with a CASB

VCR flashing 12.00?

there may be a shark circling your data

the cure for infectious malware

why free software is like a free puppy...

Why agentless CASBs rule!

Why You Need A CASB for GDPR Compliance

How to Save $2.04M on Secure Office 365

The white flag & AJAX-VM

The $650,649 iPhone Heist

CASB is Eating the MDM Market

Bringing Advanced Threat Protection to the Cloud

The View from RSA 2017

Cloud Security Requires Separation of Duties

Malware Waits for No CASB

CASB is Eating the IDaaS Market

AWS Support is Here

What's wrong with agents? Everything.

Enabling External Collaboration with a CASB

real-time agentless data protection

How Google Secures G Suite Data

In EMEA, It's the Year of the Cloud

2017 is here. Here's what infosec leaders expect.

In Healthcare, mobility is everything

Replacing MSFT Forefront TMG with a CASB

Limitations of Office 365 Data Loss Prevention (DLP)

Hackers Are Home For the Holidays

Agent-based CASB on Google Apps?

Cloud adoption is up again this year. What does that mean for you?

what's so special about a CASB: part five

Where does Salesforce platform encryption fall short?

what's so special about a CASB: part four

what's so special about a CASB: part three

Microsoft Teams vs Slack Security

Adding UEBA and Step-up 2FA to Cloud Apps

The Necessity of Secure File Sharing

Double-agent CASB?

At the Gartner Symposium, Office 365 looms large

denial, anger, bargaining, depression & acceptance...

DLP - need steak with the sizzle?

what's so special about a CASB: part two

The Data Blind Spot: Where O365 Security Falls Short

what's so special about a CASB: part one

who's viewing my docs at strange locations?

Ahead of Dreamforce, things to know about Salesforce security

What is UEBA?

the yugo of CASB?

Moving to the cloud? Here's why you need cloud DLP.

Integrating a CASB with Premises DLP

Federal court rules BYOD agents may constitute wiretapping

CASBs in Healthcare

How Strong is Your Encryption System?

anomaly detection: a critical security component

Where Office 365 Falls Short in Securing PHI

4 Risky Habits of BYOD Users

Capabilities Necessary for Complete Cloud Security

Closing the Cloud Security Gap with a CASB

CASB: Security AND Management

Should your Investment Firm fight for you?

The Evolution of Cloud Security Perceptions

Where to Start with CASB Policies?

Five Ways to Tell if Your CASB will Fly

8 Questions to Ask When Evaluating a CASB

6 ways MDM can be misused

"Cadillac of CASB" 0 - deploy in 2.4 months

4 Tips for Encrypting Google Drive

Securing Office 365 with a Cloud Access Security Broker

Adopting MDM may be sacrificing more privacy than employees realize

"the cadillac of CASB"

the ultimate trojan horse?

"Security is now a business issue"

Sandwiches, Prescription Drugs & CASB

who uses unmanaged devices?

Bluecoat + Symantec: dinosaurs' union?

How Enterprise Mobility Management (EMM) Can Annoy Users

How Cloud Data Leaks

Can cloud apps be as secure as premises-based apps?

Is OEM Software a Good Idea?

IT purchase decisions made easy

Peak MDM has come & gone, enter CASB

Bitglass Q&A: Securing Mobile with a CASB

how to start securing office 365

Bitglass report: BYOD availability outpaces adoption

Praise for secure native email on Blackberry

Marketing Matters...

The best B2B digital marketing campaigns of 2016

Controlling External File Sharing with a CASB

Bitglass adds Help Desk Diagnostics

The Bitglass Story

The Tail wags the Dog?

The View from RSA 2016

Project Cumulus: Hackers' Unusual Activity

Security and Compliance for Healthcare

A look back at the original Where's Your Data experiment

On the Dark Web, Hackers Eager to Share Tactics

Apple Debate Highlights Importance of Data Encryption

Credentials spread like wildfire in Project Cumulus data experiment

Unmanaged Device Access Control with a CASB

Encrypting Salesforce in 5 Minutes with a CASB

Improving Office 365 Performance with a CASB

How Bitglass Works

Why do hackers target healthcare data?

One in three Americans were affected by healthcare breaches in 2015

Cloud Security Responsibilities: The Wall Street Journal Test

Who Should Use Bitglass?

Cloud adoption in regulated vs unregulated industries

Education is moving to the cloud faster than any other industry

"Where's Your Data?" Experiment

Cloud adoption on the rise. Many don't follow security best practices

Secure A Cloud App in 5 Minutes

The Whole Enchilada (aka CASB)

77% Plan To Increase Mobile & Cloud Security Spend

Nasdaq: Cloud & Mobile are Inseparable...

The Four Pillars of CASBs

Cloud First, Security Now

Survey: Access Permissions Are IT Leaders' Biggest Concern

The Dangers of Proprietary CASB Architectures

Tokenization for Cloud like Chocolate for Dogs?

CASBs Hit the Mainstream!

SaaS Encryption Gotchas

And the Next Major Data Breach is...

Concerned About CISA? Encrypt Data Before It Hits The Cloud

CASBs: A better approach to cloud encryption

Top Priorities in Higher Ed: Protect Research, Enable Cloud & Mobile

Catch & Release Phishing

Office 365 Security - Data Leakage Prevention

How to Patent a Phishing Attack

Office 365 Security - Mobile Data Protection

BYOD Security 2015: Rise of the Employees

Office 365 Security - Identifying Suspicious User Behavior

Office 365 Security - Controlling Identity Sprawl

The Definitive Guide to Office 365 Security

CASBs Explained! Comic Strip Edition

Boardroom Heroes: Part 3 (Finale) – CASBs

Boardroom Heroes: Part 2 – Prepping for 2016’s User Revolt

BYOD Done Right

2015 Cloud Adoption Report - Behind the Stats

Boardroom Heroes: Part 1 – The Rise Of IT Security

Security Is Everyone's Responsibility

The Spider-Man CASB!

Firsthand Account: Employee BYOD Fears

This is How Cloud Data Leaks

Will My Employer Keep My Personal BYOD Info Private?

Is Your Company Still Trying to Use MDM for BYOD?

EMM & BYOD - Oil and Water!

‘It’s An Adoption, Not A Roll Out’

Preventing Man-in-the-Cloud Attacks with a CASB

Your Data or Your Life! MDM Installation Warning

How Bitglass Provides Searchable, Sortable Encryption for Cloud Apps

MDM is Dead Part II

2015 BYOD Security Survey - Calling all IT security Pros

Salesforce "Platform Encryption"

Delivering Industry's First & Only Complete CASB

The Art of (Cyber) War

Hybrid Architecture Cloud Access Security Brokers

Full-strength, searchable cloud encryption

MDM is Dead, According to End-Users

Demystifying the Myths Surrounding CASBs

Diluted Encryption

Mobile Security - Insider Threats, Swift Key & Zombie Apps

MDM: The Patriot Act of BYOD Programs

Making Security Invisible

6 Security Tips From the Gartner Security & Risk Management Summit

Those Who Can, Do

The Many Faced Cyber Criminal

Can MDM Secure the Mobile Cloud?

Future of the Data Center Firewall - Introducing the Cloud-tuple

Gartner Insight on CASBs - Proxy vs API Approaches

Healthcare Duped By “Spellcheck” Phishing Attack Again?

How Bitglass Authentication Works

Lifehack: 4 Things To Stop Doing when it comes to O365 Security

Teaming Up With FS-ISAC In The War Against Cyber Crime

Innovation Happens in So Many Ways

Here's How Nasty "Rombertik" Malware Evades Detection

HIPAA-Compliant BYOD After the Honeymoon

ShadowIT - The Blind leading the Blind?

"White-Hat Malware"

Notes from RSA


Think Like a Hacker

Where's Your Data? Experiment

Cloud Access Security Brokers: What Gartner Is Saying

Global Warming to Put an End to Cloud Adoption

BYOD Security - The "Managed vs. Unmanaged" Device Strategy

Premera Breach Shows Striking Similarities to Anthem

Cloud Security Alliance CEO Jim Reavis talks cloud adoption

Security Still Cloud's Achilles Heel

Swiss Cheese and MDM: The Fallacy of Cross Platform Support

Adopt The ‘Assume Mentality’ When it comes to Breaches

Security's House Of Cards

Criminals Can Get Into Your Network Without Hacking You

The Encryption Bandaid

What The Anthem Breach Means For Healthcare Security

The Mobile Barn Door

Cutting Out The Security Blind Spots

"You will get a Data Breach, Period"

Limit the Damage - Catch Breaches Early

The Truth About Encryption

The Great Security Masquerade

Anytime, Anywhere Healthcare Data Access: Worth The Risk, or Not?

The Intricacies of Insider Threats

How Does an "Outsider" Become an "Insider" Threat?

How To Protect Your Data From Wall St. Lingo, Phony Emails & Tor

Tiny Budgets & Big Responsibility – Equipping Your Cyber Security Army

Where's Your Data?

The Human Factor Of Data Security

What "The Walking Dead" and IT Security Have In Common

What’s Lurking On Your Trusted Device?

5 Tips For Healthcare Data Security

What California’s Data Breach Report Means For Healthcare

The Nightmare Before Bitglass

What Did Data Say To The Device? - "It's Not You, It's Me"

The Deadliest Warrior – BYOD Edition - MDM vs. CASB

California’s New “Gold Rush” – Data Protection

Protecting The Black Market’s Hottest Commodity – Medical Data

7M Dropbox Passwords Breached - What It Means for the Enterprise

SaaS Holes - Part 4: Lost Mobile Devices

SaaS Holes - Part 3: Data Leakage

SaaS Holes - Part 2: Suspicious Activity

Here's How Bay Cove Human Services Eliminated MDM and IAM

SaaS Holes - Part 1: Identity Sprawl

Cloud and Trust: A Match Made In IT Heaven

Taming Shadow IT with Bitglass Cloud Discovery

Does Your Salesforce Sandbox Need a Cover?

Malware Stealing Salesforce Data

How to Leverage Legacy DLP for Cloud Apps (Users will Hate You)

Cloud Access Security Brokers - Wrap-Up

Cloud Access Security Broker Proxy Architectures

CASBs: Protecting Data "On the Network"

Protecting Data "On the Device" with a CASB

Smartphone Kill Switch Won't Help BYOD Security

Protecting Data "At Access" with a CASB

Protecting Data "In the Cloud" with a CASB

Total Data Protection with CASBs

CASBs Must Balance IT Needs and Employee Demands

Wait, Aren't Cloud Apps Already Secure?

The Definitive Guide to Cloud Access Security Brokers

You are Wasting Your Time on Cloud Security

Who Leaked that Spreadsheet onto Dropbox?

Here's why IT is resistant to change

Public Cloud Flexibility Meets Private Cloud Security

Dogfooding at Bitglass: We Secure Our Own Corporate Data

Data Security is the New Data Security

Incinerating Smartphones with Sensitive Data

Is User Experience The Most Important Aspect of BYOD Security?

Microsoft Signals the Cloud Adoption Tipping Point

4 Security Functions You Need When Deploying Salesforce

Last Minute Mother's Day Gift Idea: Cloud Security

More IT Security Pros Need to Think Like This Guy

Confessions of 100 Chief Information Security Officers

Who Knew BYOD Meant So Many Things?

The Cost of PHI on Employee Mobile Devices? $2,000,000+


Here's what you need to know about securing Office 365

The most important aspect of Cloud Security? Mobile.

Next-Gen BYOD Requirement 6 of 6: Can I Get Some Privacy in Here?

Next-Gen BYOD Requirement 5 of 6: Be a People Pleaser

The Ultimate Cheat Sheet for Google Apps Security

Next-Gen BYOD Requirement 4 of 6: It's All About the Benjamins

Information-centric cloud security

The Perils of BYOD: Lose Your Phone, Get Fired!

Next-Gen BYOD Requirement 3 of 6: Clouds on the Horizon

WSJ: Privacy & the Rise of the Two Phone Employee

NSA announces "Activity-Based Marketing Platform"

Next-Gen BYOD Requirement 2 of 6: I want more

Do employees deserve privacy?

Next-Gen BYOD Requirement 1 of 6: It’s all about data

A Knife Fight in a Phone Booth: How we got from BY-Oh-NO to BYOD

Here's Why Your BYOD Program Will Fail

Dump your MDM! BYOD strategies that work

Tug of War! Security vs. Convenience

Users, IT, and BYOD Security: Can't We All Just Get Along?

Cloud Security and Employee Privacy: Why It Matters

BYOD Security: When MDM Doesn't Hit the Spot

The Perils of Agents: Change Jobs, Get Your Phone Wiped!

What CIOs are Concerned About After NSA-Cyber-Spying News

The Most Disruptive Technology Yet - How IT is Handling It

This is how long it takes to crack your CEO’s smartphone code…

Offense Wins Games, Defense Wins Championships

People-Centric SaaS Security

SaaS Security Doesn't Stop at the Cloud Infrastructure

Leaky Bucket Effect on Your BYOD & SaaS Security Policies

Welcome Michael Leigh!

Is Mobile Application Management Dead On Arrival?

Learnings from Week 2 of the Bitglass Beta: No Dragnets Please!

Login and Logout but Nothing in Between - SaaS Application Visibility

Bitglass Beta Week 1: Users Love Mobility, Hate MDM

Does Your Firewall Cover Your SaaS?

Your Data Has Left The Building