blog-banner.jpg

Total Cloud Security Blog

A Vantage Point to See Threats Before Impact

By Kevin Sheu  |  August 12, 2020 at 5:00 AM  | 
Businesswoman holding tablet pc entering password. Security concept

We recently observed another near-compromise / near-breach event.

At a time when the focus has been on adversaries that develop increasingly complex and sophisticated attacks, tried and true techniques such as compromised credentials continue to be amongst the most potent weapons. According to Verizon’s annual DBIR Report, 80 percent of confirmed data breaches involved weak, default or stolen passwords; or brute force credential compromises.

Read More

Bitglass: Deck the Cloud

By Sowmy Krishnakumar  |  December 30, 2019 at 5:00 AM  | 
Happy holidays from bitglass

With 2019 at its tail end, I can't help but reminisce on how eventful the year has been for the Bitglass family. We started the year by securing yet another round of funding to fuel our growth and went on to be featured as a leader in Gartner's 2019 Magic Quadrant for CASBs.


Read More

Prying Eyes Inside the Enterprise: Bitglass' Insider Threat Report

By Jacob Serpa  |  April 3, 2019 at 5:00 AM  | 

Threatbusters thumbnail

 

When words like cyberattack are used, they typically conjure up images of malicious, external threats. While hackers, malware, and other outside entities pose a risk to enterprise security, they are not the only threats that need to be remediated. 

Insider threats, which involve either malicious or careless insiders, are another significant threat to corporate data that must be addressed. Fortunately, Bitglass has the latest information on this topic. Read on to learn more.

Read More

Reflections from Gartner's IAM Summit 2018

By Sophia Zheng  |  December 10, 2018 at 4:54 AM  | 
Copy of Gartner Identity & Access Management SummitDecember 3 - 5, 2018Caesar's Palace, Las Vegas NVBitglass booth 119

The Bitglass team just returned from the Gartner Identity and Access Management Summit in Las Vegas. At the booth and during speaking sessions, it seemed like there were several trends in identity and data protection that continually bubbled to the surface.

Read More
FOLLOW US

BLOG TOPICS