<img src="//pixel.quantserve.com/pixel/p-_JKXxuL8SR7wu.gif?labels=_fp.event.Default" style="display: none;" border="0" height="1" width="1" alt="Quantcast">
blog-banner.jpg

Next-Gen CASB Blog

The Black Hat Experience with Bitglass

By Molly Hickman-Smith  |  August 19, 2019 at 4:57 AM  | 
Black Hat Blog

Following a six-day Vegas experience, I thought it would be interesting to reflect on all the insight and knowledge gained from almost a week of eating, sleeping, and breathing cloud security. As one of the youngest Black Hat 2019 attendees, my point of view was quite unbiased and unsuspecting as I had never attended a security event before – let alone one of the biggest events in the country.

Read More

Bitglass Sales Kick-Off – Fun, Concise, and Effective!

By Ben Rice  |  August 12, 2019 at 4:56 AM  | 
image-3

Over the last 18 years, I have been to more than 40 SKO events in cybersecurity for numerous companies as either a sponsor or an attendee. Bitglass has certainly raised the bar with its emphasis on company culture and the importance of teamwork. As the company continues to rapidly expand, its commitment to foster a strong workforce was easily seen through this past SKO's activities.

Read More

Cloud Security Posture Management: Why You Need It Now

By Samantha Nguyen  |  August 5, 2019 at 4:57 AM  | 
Digital security lock

Gartner recommends that security and risk management leaders invest in CSPM (cloud security posture management) processes and tools to avoid misconfigurations that can lead to data leakage. Although it is a relatively new class of tools, this recommendation comes with reason; CSPM allows for just what its name implies: the management of cloud security (i.e. misconfiguration handling).

Read More

Securing G Suite with Bitglass

By Will Houcheime  |  July 29, 2019 at 4:56 AM  | 
Colleagues standing in a data center in front of drawings of charts

Moving from on-premises applications to cloud applications, such as G Suite, is a big step to becoming a modern enterprise. However, without proper security measures in place, the use of cloud applications can lead to unintended data leakage that may be detrimental to an organization’s success. This is particularly true when it comes to an application like Google Drive, which is commonly used to store and share sensitive information. So, what is a modern enterprise to do?

Read More