blog-banner.jpg

Total Cloud Security Blog

Learn What Your Peers Are Thinking in Bitglass’ 2021 Remote Work Security Report

By Jeff Birnbaum  |  March 30, 2021 at 5:00 AM  | 
remote-work-blog-crop

Today we released our 2021 Remote Workforce Security Report. We surveyed 287 IT and security professionals to understand how remote work has transformed the state of security operations over the last year. 

Read More

Bitglass Security Spotlight: 6.5 Million Registered Voters Exposed in Israel, Three Weeks Before the Election

By Juan Lugo  |  March 2, 2020 at 5:00 AM  | 
Newspaper Icon with News Title - Red Arrow on a Grey Background. Mass Media Concept.

Here are the top stories of recent weeks:

  • Over 6.5 Million Israeli Voters Exposed in Online Voter Registry
  • Phishing Scam Costs Puerto Rican Government Over $2.6 Million
  • Nedbank, South Africa’s Predominant Bank is the Latest Victim of a Breach Affecting 1.7 Million Customers
  • Popular Photo Printing Mobile Application Exposed in Breach Affecting 10,000 Users
  • A Mismanaged S3 Bucket Results in a Breach Affecting 49 Million Individuals

Read More

Bitglass Security Spotlight: Cancer Centers Halted Due to Cyberattack

By Juan Lugo  |  December 18, 2019 at 5:00 AM  | 
Newspaper Icon with News Title - Red Arrow on a Grey Background. Mass Media Concept.

Here are the top stories of recent weeks:  

  • Ransomware Attack Halts Two Cancer Radiation Treatment Centers
  • Cloud Based Storage Bucket Exposed with Over 750,000 Users’ Applications 
  • A Massive Trove of Email Addresses and Passwords Left Online Without Any Protection
  • Microsoft Warns Other Organizations of Threat Actor Group, Gallium 
  • Gas Station PoS Systems Under Attack in North America, Visa Warns
Read More

Appeasing the Oasis of Unknown: Shadow IT Discovery

By Samantha Nguyen  |  October 15, 2019 at 5:00 AM  | 
Abstract blue text background

In a sea of millions of apps, which one is the biggest fish to fry? Firewall and proxy logs catch the traffic of users, but identifying what needs attention in such comprehensive logs can be overwhelming. Shadow IT discovery offers the ability to narrow down the search to apps that should be more closely monitored and controlled.

 

Read More
FOLLOW US

BLOG TOPICS

see all