<img src="//pixel.quantserve.com/pixel/p-_JKXxuL8SR7wu.gif?labels=_fp.event.Default" style="display: none;" border="0" height="1" width="1" alt="Quantcast">
blog-banner.jpg

the bitglass blog

The $650,649 iPhone Heist

By Rich Campagna  |  March 7, 2017 at 11:26 AM  | 


iphone-4s-elite-close2.jpegLast year, a stolen iPhone cost Catholic Healthcare Services of the Archdiocese of Philadelphia $650,649. Yes, a single iPhone. And no, it wasn't jewel encrusted or wrapped in a pure platinum case. It was a run of the mill iPhone that happened to contain the protected health information (PHI) of 412 nursing home residents. Unfortunately, the iPhone in question was neither encrypted, nor password protected.  The combination of PHI and lack of secure configuration meant a huge (and costly) HIPAA violation. 

Read More

Bringing Advanced Threat Protection to the Cloud

By Salim Hafid  |  March 3, 2017 at 7:00 AM  | 

malware-image.png

 Threats to corporate data are growing at a rapid pace, particularly with malware and ransomware becoming more sophisticated. The potential for a zero-day attack to compromise your endpoints, cloud apps, and more is very high. In fact, more endpoints are at risk now with the popularity of Bring Your Own Device (BYOD) than ever before. This shift toward cloud and mobile is continuously changing the way IT departments think about threat protection.

Read More

what's so special about a CASB: part five

By Kevin Gee  |  November 23, 2016 at 10:30 AM  | 

Performance and Scalability

shutterstock_374127247.jpgCloud Access Security Brokers are becoming an integral piece of organizations’ cloud security strategies. In Part 1 we learned how businesses have evolved to become more mobile and thus required comprehensive data protection that extended beyond the cloud. In Part 2 we covered the importance of real-time inline data protection. In Part 3 we delved into the type of policies and controls organizations have at their disposal to protect data. We also covered our burgeoning UEBA features and patented encryption capabilities. In Part 4 we discussed out of band Breach Discovery which provides visibility into potential data exfiltration threats. Features and capabilities are key to an effective security solution, as well as deployability and scalability.

Read More

what's so special about a CASB: part four

By Kevin Gee  |  November 15, 2016 at 12:00 PM  | 

 

Discovery Beyond Shadow IT

photo-1463310127152-33b375103141.jpegIn Part 3 we learned about Bitglass’ unique capabilities that protect your data in real-time, end-to-end. While in-band security is critical, CASBs aim to provide comprehensive data protection, which includes out-of-band threats. Bitglass’ Breach Discovery solution goes a step beyond identifying Shadow IT apps by detecting all data exfiltration threats, including malware hosts, anonymizers, TOR networks and phishing domains.

Read More