<img src="//pixel.quantserve.com/pixel/p-_JKXxuL8SR7wu.gif?labels=_fp.event.Default" style="display: none;" border="0" height="1" width="1" alt="Quantcast">
blog-banner.jpg

Next-Gen CASB Blog

Paul Sullivan

Recent Posts

"Collection #1" Data Breach

By Paul Sullivan  |  March 6, 2019 at 4:56 AM  | 

 

hacker-100614834-primary.idge

News of the 773 million email data breach that Troy Hunt announced for Have I Been Pwned certainly got a lot of coverage a few weeks ago. Now that the dust has settled, let’s cut through some of the hype and see what this really means for enterprise security.

Read More

SaaS Apps And the Need for Specialized Security

By Paul Sullivan  |  December 19, 2018 at 4:54 AM  | 
Businessman hand working with a Cloud Computing diagram on the new computer interface as concept-1

Keeping cloud services running is a complex, multi-faceted endeavor for cloud service providers. They need to juggle adding new features, keeping their customers’ sensitive data secure, and having high uptime for their services – there is virtually no room for error. Microsoft learned about the need for high uptime a few weeks ago when they suffered a four-hour outage for users with multi-factor authentication enabled on their Azure and Office 365 services.

Read More

Pwned Passwords – Have Your Credentials Been Stolen?

By Paul Sullivan  |  August 15, 2018 at 4:28 AM  | 

Closeup of young male theift in sweatshirt with hood transfering money from bills of stolen creding cards

Data breaches now seem to be a daily occurrence. In recent months, Have I Been Pwned (HIBP) introduced Pwned Passwords, which allows you to securely check your password against a database of breach data. There are over 280 breaches in the database, and that's only the tip of the iceberg. Breaches aren't just a problem for the users who lose their data, but for the companies responsible for it.   

Read More

Shadow IT and the End of the Endless Race

By Paul Sullivan  |  March 12, 2018 at 4:16 AM  | 

Hand holding smartphone with colorful app icons concept.jpeg

Using shadow IT discovery is a great way to identify data leakage – but how can organizations be certain that it is effective? First-generation cloud access security brokers (CASBs) rely on manually curating lists of cloud apps in order to enable shadow IT discovery. Each app must be individually evaluated so that its level of risk can be identified. It must also be tied to domains and IP addresses so that it can be detected in network or proxy logs. Unfortunately, there are so many apps in existence that it is impossible to gather all of the necessary information manually. However, the Next-Gen CASB is automating this process to keep up with the ever-expanding number of cloud apps.

Read More