<img src="//pixel.quantserve.com/pixel/p-_JKXxuL8SR7wu.gif?labels=_fp.event.Default" style="display: none;" border="0" height="1" width="1" alt="Quantcast">
blog-banner.jpg

the bitglass blog

Data Games: Security Insights from the Experts

By Jacob Serpa  |  September 19, 2017 at 11:28 AM  | 

Screen Shot 2017-09-14 at 4.53.03 PM.pngFor as long as there have been computers, there have been tech-savvy users fighting one another for supremacy and data. These users can be more or less categorized into two groups - White Hat hackers and Black Hat hackers. White Hat hackers often work in corporate IT and are individuals who use their skills for ethical purposes like protecting data and whistleblowing. Black Hat hackers use their talents maliciously for personal gain and are what most people envision when they think about hackers. As they fight with one another for dominance, both sides develop an increasingly deep understanding of security-related topics.

Read More

Second Gen CASBs Take the Lead

By Mike Schuricht  |  September 15, 2017 at 11:28 AM  | 

alesia-kazantceva-283291.jpgInterest in cloud security continues to increase as enterprises move to adopt cloud applications, with cloud access security brokers becoming the de facto security choice. Agile, cloud-first organizations are leading the charge to these more flexible applications, but now, large, security conscious, regulated companies are also going cloud. Security is a key pillar for all that adopt these apps.

Read More

Are Your Sync Clients Really Safe?

By Chantelle Patel  |  June 14, 2017 at 2:27 PM  | 

sabri-tuzcu-182689.jpgBox introduced their new client sync app today called Box Drive. The desktop app will allow enterprise users to access all Box files directly from the desktop, saving time and money. While apps like Box Drive make accessing data easier, they introduce a major means of data leakage if not properly secured. Enterprises using these apps have few means of controlling which users and devices are able to access data. Unmanaged device access in particular poses a major threat to the organization.

Read More

Hackers Are Home For the Holidays

By Kevin Gee  |  December 13, 2016 at 6:10 PM  | 

shutterstock_520279837.jpgWith the holiday season already in full swing, people all across the world are sharing their personal and financial information with hundreds of retailers as they scramble to purchase gifts for family and friends. This makes it a perfect time to remember the countless company breaches over the past few holiday seasons and reflect on how enterprises can better protect Payment Card Industry data (PCI). Your employees and customers have enough to worry about without the additional concern that a breach may lead to information being exposed to malicious parties.  

Read More