<img src="//pixel.quantserve.com/pixel/p-_JKXxuL8SR7wu.gif?labels=_fp.event.Default" style="display: none;" border="0" height="1" width="1" alt="Quantcast">

Next-Gen CASB Blog

The Early Bird Gets the Virus

By Kevin Lee  |  March 5, 2018 at 4:41 AM  | 

Image of businessman touching virus alert icon.jpeg

Most people have heard of the proverb, "The early bird gets the worm." The part that many haven't heard is the followup, "But the second mouse gets the cheese." The latter proverb makes a lot of sense when you apply it to the current state of virus and malware detection. 

Read More

Are Your Sync Clients Really Safe?

By Chantelle Patel  |  June 14, 2017 at 2:27 PM  | 

sabri-tuzcu-182689.jpgBox introduced their new client sync app today called Box Drive. The desktop app will allow enterprise users to access all Box files directly from the desktop, saving time and money. While apps like Box Drive make accessing data easier, they introduce a major means of data leakage if not properly secured. Enterprises using these apps have few means of controlling which users and devices are able to access data. Unmanaged device access in particular poses a major threat to the organization.

Read More

Malware: Painting a Picture Part 2

By Jacob Serpa  |  May 26, 2017 at 6:00 AM  | 

ricardo-viana-105232.jpgAs firms try to migrate to the cloud and protect themselves from threats like
malware, they are engaging in a delicate process that can be compared to creating a painting (as discussed in Part One). In this analogy, malware can be thought of as a saboteur who throws paint at the canvas to ruin the design. Below, one can find the remaining pieces of this story.

Read More

Ransomware 101

By Jacob Serpa  |  May 17, 2017 at 6:00 AM  | 

ilya-pavlov-87438.jpgUnless you’ve been living under a rock for the last few weeks, you know that there has been a notable increase in cyberattacks around the world. Hackers have been spreading a type of ransomware called “WannaCry” via emails that trick recipients to open attachments that make them vulnerable to the attack.

Read More