Total Cloud Security Blog

Cornerstone Capabilities of Cloud Access Security Brokers

By Jacob Serpa  |  January 2, 2019 at 4:40 AM  | 

Traditional security tools are not built to protect cloud data that is accessed from personal devices around the clock and around the world. With the rise of bring your own device (BYOD) and cloud-based tools like AWS, Office 365, and Salesforce, it can be challenging to figure out which technologies are needed to keep data safe. Fortunately, cloud access security brokers (CASBs) have arisen as the tools of choice for securing data wherever it goes. Want to know which kinds of CASB features are needed to protect your organization's sensitive information? Learn more by watching the below Glass Class.

Read More

Orbitz: Why You Can't Secure Data in the Dark

By Jacob Serpa  |  March 22, 2018 at 4:29 AM  | 

Cloud Computing Concept. The Future - Everything from Socket.jpeg

On March 1, 2018, Orbitz discovered that a malicious party may have stolen information from one of its legacy platforms. The compromised platform housed Orbitz customer information such as mailing addresses, phone numbers, email addresses, and full names, as well as details about nearly 900,000 payment cards. 

This breach highlights the struggle that many companies face on a day-to-day basis. 

Read More

Are Your Sync Clients Really Safe?

By Chantelle Patel  |  June 14, 2017 at 2:27 PM  | 

sabri-tuzcu-182689.jpgBox introduced their new client sync app today called Box Drive. The desktop app will allow enterprise users to access all Box files directly from the desktop, saving time and money. While apps like Box Drive make accessing data easier, they introduce a major means of data leakage if not properly secured. Enterprises using these apps have few means of controlling which users and devices are able to access data. Unmanaged device access in particular poses a major threat to the organization.

Read More

Where to Start with CASB Policies?

By Rich Campagna  |  July 11, 2016 at 6:02 AM  | 

starting_casb_policies.pngCloud Access Security Brokers offer a wealth of functionality - from encryption to mobile data protection, data leakage prevention, and more. Since these tools are typically being deployed for the first time in most enterprises, it can be difficult to decide where to start!

Read More