<img src="//pixel.quantserve.com/pixel/p-_JKXxuL8SR7wu.gif?labels=_fp.event.Default" style="display: none;" border="0" height="1" width="1" alt="Quantcast">
blog-banner.jpg

Next-Gen CASB Blog

The Newspaper Test

By Dave Rogers  |  June 17, 2019 at 4:57 AM  | 
Copy of Major Breach_page-0001

Does your cybersecurity solution measure up to the “newspaper test?”


We’ve all seen the news headlines about data breaches, malware attacks, and other security debacles at some of the top companies and organizations around the world. How often these incidents occur is increasing due to the lack of security that these organizations are implementing when migrating to the cloud. In our latest report, Kings of the Monster Breaches, we examine some of the biggest breaches that have occurred in the past few years, and the effects that they have had on organizations. Also, here are some additional examples of large companies falling victim to cyberattacks:

Read More

First American Breach Retrospective

By Paul Sullivan  |  June 10, 2019 at 4:57 AM  | 
Business graph with arrow showing profits and gains

Krebs On Security recently broke the news that First American, a major financial services corporation, had about 885 million real estate documents exposed on its website, with records dating back to 2003. First American is one of the largest providers of real estate title insurance, and these documents contained sensitive information such as Social Security numbers as well as financial data belonging to individuals and small businesses.

Read More

Glass Class: Mitigating Risk before Shadow IT

By Will Houcheime  |  June 5, 2019 at 4:56 AM  | 

 

In today’s cloud-first world, employees are sometimes trusted to manage their own projects, giving them freedom to work with the tools of their choosing to complete their tasks. Occasionally, these tools are cloud applications that organizations are not made aware of, making them a security risk that can expose sensitive data. Consequently, organizations have been leveraging a tool called shadow IT discovery. In this way, companies gain insight into what employees are using and how risky these unsanctioned applications truly are.


Shadow IT discovery is important; however, it shouldn’t be the first step to securing your data in the cloud. In our latest Glass Class, we talk about steps that you should prioritize before investigating the unmanaged applications used in your organization. Want to find out more? Watch the latest episode of Glass Class below.

Read More

What is a CASB and How Do You Even Say It?

By Caleb Mast  |  June 3, 2019 at 4:56 AM  | 
john-reid-jordan-lucas-ezekiel-elliott-ncaa-football-penn-state-ohio-state1

These are some of the questions that I asked as I went through the recruiting process with Bitglass. My goal was to understand the product completely before going out and pitching it to prospective clients. So, what exactly is a Cloud Access Security Broker (CASB)? By Gartner’s definition, CASBs (Cloud Access Security Brokers) are “on-premises, or cloud-based security policy enforcement points, placed between cloud service consumers and cloud service providers to combine and interject enterprise security policies as the cloud-based resources are accessed.


Read More