<img src="//pixel.quantserve.com/pixel/p-_JKXxuL8SR7wu.gif?labels=_fp.event.Default" style="display: none;" border="0" height="1" width="1" alt="Quantcast">
blog-banner.jpg

the bitglass blog

The Great CASB: Part One

By Jacob Serpa  |  July 27, 2017 at 9:07 AM  | 

tim-gouw-167127.jpgWhy You Need a CASB

Now more than ever, enterprises are turning to the cloud. By using IaaS and SaaS applications, companies are able to gain a number of benefits that are unavailable with rigid, traditional solutions. For example, migrating to the cloud allows firms to cut down on the costs associated with having in-house infrastructure and larger IT teams. In addition to this cost benefit, increased flexibility is readily available with the cloud. Because companies need fewer traditional, on-premises solutions, they are granted greater scalability. Whether it’s because of data storage or web traffic, scaling up and down are both simple endeavors with the cloud.

Read More

Verizon Breach: How CASB Encryption Can Protect Your Data

By Chantelle Patel  |  July 17, 2017 at 2:40 PM  | 

clem-onojeghuo-181555.jpgAs has been widely reported, Verizon is the latest enterprise to be hit with a large-scale data breach. Over 14 million customer records were left exposed due to a misconfiguration in Verizon’s Amazon Web Services (AWS) instance. Among the leaked information were logs containing customer names, cell phone numbers, and account PINs. Had this data fallen into the hands of hackers, even the most security conscious users – those with two-step authentication enabled – could have been bypassed, allowing hackers to hijack a customer's account and phone number.

Read More

Agentless CASB Accelerates Ransomware Disaster Recovery

By Anurag Kahol  |  July 6, 2017 at 10:45 AM  | 

shutterstock_317679224.jpgThe recent ransomware attacks that ravaged organizations around the globe last week have brought sudden attention to a longstanding problem. Few enterprises today are prepared for a ransomware attack and while most discussions focus on detection capabilities, disaster recovery is often overlooked. Disaster recovery strategies have always focused on server side failures – datacenters going offline, corrupted databases, and the like – not on mass disablement of clients (laptops and desktops).

Read More

Glass Class: The Malware Maze

By Chantelle Patel  |  June 30, 2017 at 10:23 AM  | 

christopher-gower-291246.jpgCyber attacks on sensitive data have made far too many headlines in the recent weeks. Each attack differs in execution, but one thing is often the same - malware is making its way into the network and it's spreading like wildfire.

Read More