<img src="//pixel.quantserve.com/pixel/p-_JKXxuL8SR7wu.gif?labels=_fp.event.Default" style="display: none;" border="0" height="1" width="1" alt="Quantcast">
blog-banner.jpg

the bitglass blog

Jacob Serpa

Recent Posts

Fast and Frenzied Cloud Adoption

By Jacob Serpa  |  June 7, 2017 at 6:00 AM  | 

Screen Shot 2017-06-07 at 8.48.40 AM.pngEvery day, the cloud becomes more and more of a necessary tool for businesses. Enterprises continually migrate to the cloud for lower costs and greater flexibility. As more firms do so, making the transition becomes a necessity to keep up with competition. In light of the utility the cloud provides, one may wonder how many companies are actually making use of it. 

Read More

Malware: Painting a Picture Part 2

By Jacob Serpa  |  May 26, 2017 at 6:00 AM  | 


ricardo-viana-105232.jpgAs firms try to migrate to the cloud and protect themselves from threats like
malware, they are engaging in a delicate process that can be compared to creating a painting (as discussed in Part One). In this analogy, malware can be thought of as a saboteur who throws paint at the canvas to ruin the design. Below, one can find the remaining pieces of this story.

Read More

GDPR Waits for No Company

By Jacob Serpa  |  May 23, 2017 at 6:00 AM  | 

shutterstock_289194575.jpgIn May of 2018, the EU will begin enforcing its General Data Protection Regulation (GDPR) to ensure the security and privacy of member states’ citizens’ data. As virtually all organizations collecting or handling the personal data of EU citizens will be affected by the regulation, they must begin taking actions to reach compliance. Failure to do so can lead to heavy financial and reputational penalties.

Read More

Ransomware 101

By Jacob Serpa  |  May 17, 2017 at 6:00 AM  | 

ilya-pavlov-87438.jpgUnless you’ve been living under a rock for the last few weeks, you know that there has been a notable increase in cyberattacks around the world. Hackers have been spreading a type of ransomware called “WannaCry” via emails that trick recipients to open attachments that make them vulnerable to the attack.

Read More