<img src="//pixel.quantserve.com/pixel/p-_JKXxuL8SR7wu.gif?labels=_fp.event.Default" style="display: none;" border="0" height="1" width="1" alt="Quantcast">
blog-banner.jpg

the bitglass blog

Jacob Serpa

Recent Posts

Saturday Morning Security Spotlight

By Jacob Serpa  |  November 18, 2017 at 7:13 AM  | 
Businessman holding a newspaper while having breakfast in his kitchen.jpeg

The top cybersecurity stories of the week revolved around malware and breaches. Infections and data theft remain very threatening realities for the enterprise.

400 Million Malware Infections in Q3 of 2017

In the last few months, malware has successfully infected hundred of millions of devices around the world. As time passes, threats will continue to become more sophisticated, effective, and global in reach. To defend themselves, organizations must remain informed about current malware trends. 

Read More

Avoid a Breach: 5 Tips to Secure Data Access

By Jacob Serpa  |  October 25, 2017 at 6:00 AM  | 

glenn-carstens-peters-190592.jpgAlthough the cloud is a boon to productivity, flexibility, and cost savings, it can also be a confusing tool to utilize properly. When organizations misunderstand how to use it, they often expose themselves to threats. While there aren’t necessarily more threats when using the cloud, there are different varieties of threats. As such, organizations need to employ the below cloud security best practices when they make use of applications like Salesforce, Office 365, and more.

Read More

CASB For Hire

By Jacob Serpa  |  October 5, 2017 at 2:25 PM  | 

glenn-carstens-peters-203007 (1).jpgRecently, a trivia-loving employee at Bitglass uncovered an interesting job opening on a leading financial institution’s careers page. The position was titled “Cloud Access Security Broker Principal Architect” and was focused on ensuring the full implementation of a cloud access security broker (CASB). This obviously highlights the growing importance of advanced security solutions like CASBs. In light of this, Bitglass wanted to create a miniature job description of its own.

Read More

Data Games: Security Insights from the Experts

By Jacob Serpa  |  September 19, 2017 at 11:28 AM  | 

Screen Shot 2017-09-14 at 4.53.03 PM.pngFor as long as there have been computers, there have been tech-savvy users fighting one another for supremacy and data. These users can be more or less categorized into two groups - White Hat hackers and Black Hat hackers. White Hat hackers often work in corporate IT and are individuals who use their skills for ethical purposes like protecting data and whistleblowing. Black Hat hackers use their talents maliciously for personal gain and are what most people envision when they think about hackers. As they fight with one another for dominance, both sides develop an increasingly deep understanding of security-related topics.

Read More