Security "Bits"

Salim Hafid

Salim Hafid

Find me on:

Recent Posts

In Europe, Cloud Is the New Default

By Salim Hafid  |  August 27, 2018 at 4:16 AM  | 

raidersIf you keep up with the blog you'll remember our 2018 global cloud adoption report, wherein thousands of organizations deployed cloud apps since we last conducted our automated analysis of over 100,000 firms. Many in EMEA wanted to know how Europe stacked up against the rest of the world, against the US, and whether companies in region were securing their cloud environments.

Read More

At Black Hat 2018, Cloud Security Comes to the Fore

By Salim Hafid  |  August 13, 2018 at 4:47 AM  | 

blackhatLas Vegas, Nevada is an interesting town – add Black Hat attendees into the mix and you find yourself in some fascinating conversations about very real and pressing security issues facing every enterprise. Of note, cloud security was top of mind for every Security Architect, Engineer, and CISO at the conference.

Everyone is asking the same questions: where is the industry moving? What are the security gaps in my cloud environment? How should I evaluate competing solutions?

Below are the top 4 takeaways from Black Hat 2018.

Read More

Are Traditional Security Tools Dead?

By Salim Hafid  |  April 11, 2018 at 5:00 AM  | 

Cloud Hard 2018When evaluating security options, CISOs and security architects are always looking to the solution that will minimize cost and administrative overhead while maximizing data protection. At the highest levels, enterprises have relied on traditional tools as a means of protecting data over the long term, but as cloud app adoption rises, these tools are increasingly seen as ineffective; incapable of meeting the needs of an evolving enterprise with a growing stable of cloud apps and unmanaged endpoints capable of accessing those apps.

Read More

Mobile Security in 2018 – It's Time to Evolve

By Salim Hafid  |  March 28, 2018 at 4:34 AM  | 

When organizations adopt cloud and allow employees to work from mobile devices, they need to begin securing their data in new ways. As corporate information flows to different types of endpoints, different types of tools are needed in order to protect it. It is time for the modern enterprise to evolve and make use of separate security solutions for managed and unmanaged devices – the two can no longer be treated in the same fashion. 

Read More


see all