<img src="//pixel.quantserve.com/pixel/p-_JKXxuL8SR7wu.gif?labels=_fp.event.Default" style="display: none;" border="0" height="1" width="1" alt="Quantcast">
blog-banner.jpg

the bitglass blog

Kevin Gee

Recent Posts

Insider Threats, Machine Learning, and the Next-Gen CASB

By Kevin Gee  |  November 30, 2017 at 6:06 AM  | 

Silhouette of human head with gears mechanism instead of brain.jpegOne of the biggest dangers to application security is that of the insider threat. This ranges from users who unknowingly expose credentials and sensitive data to external parties, to disgruntled employees who act against the company's interests. These threats are difficult to prevent with common security configurations and are big reasons why user and entity behavior analytics (UEBA) is such a common buzzword within the security industry.  

Read More

What's wrong with agents? Everything.

By Kevin Gee  |  January 31, 2017 at 4:50 PM  | 


Picture1.png


Above and below are just a small sample of some of the most recent and helpful reviews on two of the top Mobile Device Management (MDM) vendors in the market (go ahead and look up reviews on the iOS App Store or Google Play store). Why should employees have to suffer  just to be able to access their corporate email and get work done on their mobile devices? Either employees begrudgingly use the applications and are less efficient or they opt out altogether, disconnecting themselves from work and contact.

Read More

Hackers Are Home For the Holidays

By Kevin Gee  |  December 13, 2016 at 6:10 PM  | 

shutterstock_520279837.jpgWith the holiday season already in full swing, people all across the world are sharing their personal and financial information with hundreds of retailers as they scramble to purchase gifts for family and friends. This makes it a perfect time to remember the countless company breaches over the past few holiday seasons and reflect on how enterprises can better protect Payment Card Industry data (PCI). Your employees and customers have enough to worry about without the additional concern that a breach may lead to information being exposed to malicious parties.  

Read More

what's so special about a CASB: part five

By Kevin Gee  |  November 23, 2016 at 10:30 AM  | 

Performance and Scalability

shutterstock_374127247.jpgCloud Access Security Brokers are becoming an integral piece of organizations’ cloud security strategies. In Part 1 we learned how businesses have evolved to become more mobile and thus required comprehensive data protection that extended beyond the cloud. In Part 2 we covered the importance of real-time inline data protection. In Part 3 we delved into the type of policies and controls organizations have at their disposal to protect data. We also covered our burgeoning UEBA features and patented encryption capabilities. In Part 4 we discussed out of band Breach Discovery which provides visibility into potential data exfiltration threats. Features and capabilities are key to an effective security solution, as well as deployability and scalability.

Read More