<img src="//pixel.quantserve.com/pixel/p-_JKXxuL8SR7wu.gif?labels=_fp.event.Default" style="display: none;" border="0" height="1" width="1" alt="Quantcast">
blog-banner.jpg

Next-Gen CASB Blog

"Where's Your Data?" Experiment

By Bitglass | December 16, 2015 at 1:29 PM



Video Transcript

205 days. That's how long it takes most companies their data has been breached. Home Depot. JP Morgan. Sony. Anthem. Target. These breaches are a reminder of the world we live in today. A world in which security breaches are not preventable. A world utilizing new data storage technology but relying on old technology to keep it secure. In 2014 there were over 780 breaches, roughly 15 per week. Many of these breaches headlined multinational Fortune 500 companies. Millions of identities stolen but then what?

Bitglass's watermarking technology is used by enterprises to maintain control and visibility over corporate data after it leaves the network. It works by phoning home to your security team every time the data is accessed. It allow organizations to recognize suspicious data access, act on it quickly, and limit damage.

In early 2015 bitglass launched the world's first data tracking experiment in the dark-web to help uncover the truth about where data goes after it has been breached. The answer was just a watermark away. A fake list of 1,500 employees and their SSN, credit card numbers, and addresses was compiled. It was embedded with bitglass's watermarking technology and posted on the dark-web in the very same marketplaces used by cyber-criminals.

In just 12 days the breach data was shared in 22 countries spanning 5 continents. It received over 1,100 clicks and was downloaded 47 times. The experiment also uncovered IP addresses associated with 2 potential cyber-crime syndicates.

This is the actionable intelligence needed in today's cyber security world. This experiment proves that although breaches are not preventable, they are discoverable. Enterprises must come to terms with the dark new reality. It's no longer a matter of "if" you'll be breached but when. As corporate data moves beyond the firewall, traditional security solutions have become obsolete. The battle against cyber-crime now calls for something new. So...who's keeping tabs on you data?