Total Cloud Security Blog

A Vantage Point to See Threats Before Impact

By Kevin Sheu  |  August 12, 2020 at 5:00 AM  | 
Businesswoman holding tablet pc entering password. Security concept

We recently observed another near-compromise / near-breach event.

At a time when the focus has been on adversaries that develop increasingly complex and sophisticated attacks, tried and true techniques such as compromised credentials continue to be amongst the most potent weapons. According to Verizon’s annual DBIR Report, 80 percent of confirmed data breaches involved weak, default or stolen passwords; or brute force credential compromises.

Read More

Securing Any App With Bitglass

By Juan Lugo  |  August 10, 2020 at 5:00 AM  | 

The rise of the cloud has enabled organizations’ employees to perform their work duties in any location and from a multitude of devices. Now more than ever, employees are accessing a plethora of applications that allow them to remain productive. While these apps improve IT flexibility and employee productivity, they also pose data leakage and compliance challenges when they are not properly secured.

Read More

Security Architecture podcast and the Bitglass SASE

By Will Houcheime  |  July 22, 2020 at 5:00 AM  | 
Business woman hand typing on keyboard with application icons around

With the rapid growth of the remote workforce, organizations are in need of a comprehensive security platform that offers a plethora of capabilities for securing today’s business environment. Recently, on Security Architecture, a podcast that covers best security practices, Bitglass' VP of Product Management, Mike Schuricht, discussed the topic of secure access service edge (SASE), outbound browsing, and how they work.

Read More

Cost-Effective Cloud Security for the Modern Enterprise: Part 2

By Juan Lugo  |  July 13, 2020 at 5:00 AM  | 

Due to recent global events, conducting business has been an uphill battle across industries around the world--more so than ever before. While facing a decelerating global economy, organizations are still responsible for enabling their own remote workforce, protecting data and defending against cyberthreats, and reducing costs. Unfortunately, enterprises that manage disjointed security solutions experience a myriad of unnecessary financial costs, tied to operational bottlenecks, high management costs, and more.

Read More