<img src="//pixel.quantserve.com/pixel/p-_JKXxuL8SR7wu.gif?labels=_fp.event.Default" style="display: none;" border="0" height="1" width="1" alt="Quantcast">
blog-banner.jpg

Next-Gen CASB Blog

Pwned Passwords – Have Your Credentials Been Stolen?

By Paul Sullivan  |  August 15, 2018 at 4:28 AM  | 

Closeup of young male theift in sweatshirt with hood transfering money from bills of stolen creding cards

Data breaches now seem to be a daily occurrence. In recent months, Have I Been Pwned (HIBP) introduced Pwned Passwords, which allows you to securely check your password against a database of breach data. There are over 280 breaches in the database, and that's only the tip of the iceberg. Breaches aren't just a problem for the users who lose their data, but for the companies responsible for it.   

Read More

The Wall Street Journal Names Bitglass the Top Tech Company

By Jacob Serpa  |  August 8, 2018 at 4:10 AM  | 

Business man pointing to black board with text The Winner Is...

The Next-Gen CASB has been very busy in recent weeks. Bitglass has been winning awards, gaining media attention, developing strategic partnerships, advancing its technologies, signing new customers, and much more. So, we wanted to take a moment to highlight some of the Next-Gen CASB's recent successes; specifically, earning recognition from The Wall Street Journal, partnering with Okta, and winning the Visionary Vendor of the Year award.   

Read More

How to Surf the Tidal Wave of SaaS Apps: A CASB Story

By Mike Schuricht  |  May 7, 2018 at 4:45 AM  | 

More and more cloud apps are arising every day, creating a massive SaaS tidal wave. These apps can offer increased efficiency for their users, expose data to malicious hackers, and be used by employees looking to steal data. Regardless of the motive behind using it, shadow IT causes the enterprise to lose visibility and control over where its data is going and who is accessing it. As such, organizations cannot stand idly by as their data slips through their fingers; rather, they must find a way to ride the ever-growing wave of SaaS apps.

Read More

Shadow IT and the End of the Endless Race

By Paul Sullivan  |  March 12, 2018 at 4:16 AM  | 

Hand holding smartphone with colorful app icons concept.jpeg

Using shadow IT discovery is a great way to identify data leakage – but how can organizations be certain that it is effective? First-generation cloud access security brokers (CASBs) rely on manually curating lists of cloud apps in order to enable shadow IT discovery. Each app must be individually evaluated so that its level of risk can be identified. It must also be tied to domains and IP addresses so that it can be detected in network or proxy logs. Unfortunately, there are so many apps in existence that it is impossible to gather all of the necessary information manually. However, the Next-Gen CASB is automating this process to keep up with the ever-expanding number of cloud apps.

Read More