<img src="//pixel.quantserve.com/pixel/p-_JKXxuL8SR7wu.gif?labels=_fp.event.Default" style="display: none;" border="0" height="1" width="1" alt="Quantcast">
blog-banner.jpg

Next-Gen CASB Blog

Jacob Serpa

Recent Posts

Cornerstone Capabilities of Cloud Access Security Brokers

By Jacob Serpa  |  January 2, 2019 at 4:40 AM  | 

Traditional security tools are not built to protect cloud data that is accessed from personal devices around the clock and around the world. With the rise of bring your own device (BYOD) and cloud-based tools like AWS, Office 365, and Salesforce, it can be challenging to figure out which technologies are needed to keep data safe. Fortunately, cloud access security brokers (CASBs) have arisen as the tools of choice for securing data wherever it goes. Want to know which kinds of CASB features are needed to protect your organization's sensitive information? Learn more by watching the below Glass Class.

Read More

Bitglass Security Spotlight: US Government Breaches Abound

By Jacob Serpa  |  November 7, 2018 at 5:01 AM  | 
Businessman holding a newspaper while having breakfast in his kitchen.jpeg

Here are the top cybersecurity stories of recent weeks: 

  • Healthcare.gov breached
  • US weapons systems contain cybersecurity gaps
  • Over 35 million US voter records for sale
  • National Guard faces ransomware attack
Read More

Bitglass Named a Leader in Gartner's 2018 Magic Quadrant for CASB

By Jacob Serpa  |  November 1, 2018 at 8:56 AM  | 

Gartner 2018 MQ for CASBs

 

Gartner just released its 2018 Magic Quadrant for Cloud Access Security Brokers, wherein Bitglass was recognized as a Leader in the CASB space. Like last year, companies were evaluated based on completeness of vision as well as the ability to execute. We believe that our positioning is due to all of our growth over the past twelve months, the world's best customers, and an incredible amount of hard work from our employees around the globe. 

Read More

The Ins and Outs of Insider Threats

By Jacob Serpa  |  October 29, 2018 at 5:38 AM  | 

Insider threats are among the leading causes of breaches. As they involve the usage of legitimate corporate credentials to access enterprise resources (AWS, Office 365, Salesforce, and others like them), they are inherently quite challenging to detect. What is an enterprise to do? Learn more by watching the below Glass Class.

Read More