Security "Bits"

Pwned Passwords – Have Your Credentials Been Stolen?

By Paul Sullivan  |  August 15, 2018 at 4:28 AM  | 

Closeup of young male theift in sweatshirt with hood transfering money from bills of stolen creding cards

Data breaches now seem to be a daily occurrence. In recent months, Have I Been Pwned (HIBP) introduced Pwned Passwords, which allows you to securely check your password against a database of breach data. There are over 280 breaches in the database, and that's only the tip of the iceberg. Breaches aren't just a problem for the users who lose their data, but for the companies responsible for it.   

Read More

The Wall Street Journal Names Bitglass the Top Tech Company

By Jacob Serpa  |  August 8, 2018 at 4:10 AM  | 

Business man pointing to black board with text The Winner Is...

The Next-Gen CASB has been very busy in recent weeks. Bitglass has been winning awards, gaining media attention, developing strategic partnerships, advancing its technologies, signing new customers, and much more. So, we wanted to take a moment to highlight some of the Next-Gen CASB's recent successes; specifically, earning recognition from The Wall Street Journal, partnering with Okta, and winning the Visionary Vendor of the Year award.   

Read More

RSA Asia Pacific & Japan: Cloud Is Here to Stay

By David Shephard  |  July 30, 2018 at 4:46 AM  | 

RSA APJ Skyline

If the volume and level of conversations we enjoyed at the RSA Conference in Singapore last week are anything to go by, Bitglass and the partners in our Altitude Partner Program have every reason to feel optimistic about the Asia Pacific region.

For three days on the show floor, the Bitglass stand was consistently busy with visitors asking about our Next-Gen CASB and how we can help them solve data security problems relating to the use of cloud and mobile devices. Unlike some previous events, we spent little time having to answer “What’s a CASB?” or “Why would we need a CASB?”

Read More

Shadow IT and the End of the Endless Race

By Paul Sullivan  |  March 12, 2018 at 4:16 AM  | 

Hand holding smartphone with colorful app icons concept.jpeg

Using shadow IT discovery is a great way to identify data leakage – but how can organizations be certain that it is effective? First-generation cloud access security brokers (CASBs) rely on manually curating lists of cloud apps in order to enable shadow IT discovery. Each app must be individually evaluated so that its level of risk can be identified. It must also be tied to domains and IP addresses so that it can be detected in network or proxy logs. Unfortunately, there are so many apps in existence that it is impossible to gather all of the necessary information manually. However, the Next-Gen CASB is automating this process to keep up with the ever-expanding number of cloud apps.

Read More


see all