blog-banner.jpg

Security "Bits"

Why the World Needs Proactive Cybersecurity

By Ben Rice  |  August 31, 2021 at 5:00 AM  | 
Hand presenting against serene landscape with city on the horizon at night

Computing is now in a ubiquitous state with users able to connect to a dizzying number of services and applications. Companies have networked together everything to reduce costs, increase automation, and achieve digital transformation to make employees more productive.  This ease of access and interconnectedness also leads to grave security threats and the urgent need for proactive cybersecurity. Although the penetration of security products in business has gradually increased over time the sophistication of attackers has also advanced at an exponentially higher rate. This problem is even more grave for small and medium-sized companies because they often lack the expertise and tools needed to implement a proactive cybersecurity program. One that stops threats before they result in data breaches.

Read More

Why IaaS Security Should be a Priority

By Jonathan Andresen  |  July 27, 2021 at 5:00 AM  | 
1-2

Why are CIOs and IT organizations prioritizing investment in cloud infrastructure? The answer is simple: to better support virtual workforces, supply chains, and partners. Getting the most value out of legacy systems typically involves integrating them with cloud infrastructure and apps. As a result, cloud infrastructure in IaaS is projected to see an end-user spending increase of 38.5% this year alone – growing to $223B in 2025, making it one of the fastest growing cloud services according to Gartner. Popular infrastructure services include Amazon’s Elastic Compute (EC2), the Google Compute Engine, and Microsoft Azure.

Read More

Stop Misconfigurations with Bitglass SaaS Security Posture Management (SSPM)

By Jeff Birnbaum  |  April 6, 2021 at 5:00 AM  | 
3 logos

SaaS has many advantages over on-premises software deployments, including lower upfront costs, quick setup and deployment, and accessibility from any device with a browser and internet connectivity. Because of this, organizations rely on SaaS to run their operations. Yet a single misconfiguration of your SaaS could lead to data theft or malicious data corruption. For example, not configuring the requirement for complex passwords can make a brute force attack on a SaaS account login more likely to succeed. Or improper file restrictions may make data available for users who should not have access to it. That is why organizations need a SaaS security posture management (SSPM) solution.

Read More

Learn What Your Peers Are Thinking in Bitglass’ 2021 Remote Work Security Report

By Jeff Birnbaum  |  March 30, 2021 at 5:00 AM  | 
remote-work-blog-crop

Today we released our 2021 Remote Workforce Security Report. We surveyed 287 IT and security professionals to understand how remote work has transformed the state of security operations over the last year. 

Read More
FOLLOW US

BLOG TOPICS

see all