<img src="//pixel.quantserve.com/pixel/p-_JKXxuL8SR7wu.gif?labels=_fp.event.Default" style="display: none;" border="0" height="1" width="1" alt="Quantcast">
blog-banner.jpg

Next-Gen CASB Blog

Unsanctioned Apps in the Enterprise

By Prasidh Srikanth  |  February 11, 2019 at 4:54 AM  | 
Hand holding smartphone with media icons and symbol collection

Today, organizations leverage a plethora of software applications to enhance productivity, increase collaboration, and evolve their businesses. Some of these applications are IT approved and are purchased with a license by the organization at large; for example, Office 365, Slack, or Salesforce. These are referred to as licenced, managed, and sanctioned applications, but they all fall under the same app category (these titles can be used interchangeably).

Read More

Finance: A Cloud Security Investigation (CSI)

By Will Houcheime  |  January 30, 2019 at 4:56 AM  | 
unnamed-1

In a recent Bitglass Security Spotlight, we enumerated the risks associated with failing to implement proper data and threat protection in financial services. Financial organizations are often targeted by hackers who are looking to seize personally identifiable information (PII) and nonpublic personal information (NPI) – this information is useful for identity theft and lucrative to sell on the dark web. Data loss prevention (DLP) and access controls are obvious priorities, and while employees generally use managed devices in the financial industry, data leakage is still a common occurrence.

Read More

Cornerstone Capabilities of Cloud Access Security Brokers

By Jacob Serpa  |  January 2, 2019 at 4:40 AM  | 

Traditional security tools are not built to protect cloud data that is accessed from personal devices around the clock and around the world. With the rise of bring your own device (BYOD) and cloud-based tools like AWS, Office 365, and Salesforce, it can be challenging to figure out which technologies are needed to keep data safe. Fortunately, cloud access security brokers (CASBs) have arisen as the tools of choice for securing data wherever it goes. Want to know which kinds of CASB features are needed to protect your organization's sensitive information? Learn more by watching the below Glass Class.

Read More

Data Games: Security Insights from the Experts

By Jacob Serpa  |  September 19, 2017 at 11:28 AM  | 

Screen Shot 2017-09-14 at 4.53.03 PM.pngFor as long as there have been computers, there have been tech-savvy users fighting one another for supremacy and data. These users can be more or less categorized into two groups - White Hat hackers and Black Hat hackers. White Hat hackers often work in corporate IT and are individuals who use their skills for ethical purposes like protecting data and whistleblowing. Black Hat hackers use their talents maliciously for personal gain and are what most people envision when they think about hackers. As they fight with one another for dominance, both sides develop an increasingly deep understanding of security-related topics.

Read More