blog-banner.jpg

Security "Bits"

Learn What Your Peers Are Thinking in Bitglass’ 2021 Remote Work Security Report

By Jeff Birnbaum  |  March 30, 2021 at 5:00 AM  | 
remote-work-blog-crop

Today we released our 2021 Remote Workforce Security Report. We surveyed 287 IT and security professionals to understand how remote work has transformed the state of security operations over the last year. 

Read More

ATP and SWG with Bitglass: Stopping Threats in the Open Ocean

By Jacob Serpa  |  January 19, 2021 at 5:00 AM  | 

perfect sky and water of indian ocean-1

While it is self-evident that the world wide web is an indispensable asset for businesses around the globe, it is equally obvious that securing its use is of utmost importance. The internet is an open ocean filled with threats lying just below the surface. Malware can be downloaded from a virtually infinite number of destinations and subsequently spread throughout an enterprise's IT ecosystem. For organizations that aren't prepared to defend against these threats on the web, breaches are sure to follow. Fortunately, Bitglass is a puncture-proof vessel built to stop threats on this open ocean. 

Read More

SASE vs Zero Trust

By Kevin Sheu  |  January 11, 2021 at 5:00 AM  | 
businessman hand working with modern technology and digital layer effect as business strategy concept-3

As we start the new year and see companies begin their plans and execution for “the new normal”, a topic of discussion from a past Customer Advisory meeting has become much more pronounced: what is the relationship between Zero Trust and Secure Access Service Edge (SASE)? Is one more relevant as security teams begin preparing for either a return to the office or an increasingly distributed environment?


Read More

A Vantage Point to See Threats Before Impact

By Kevin Sheu  |  August 12, 2020 at 5:00 AM  | 
Businesswoman holding tablet pc entering password. Security concept

We recently observed another near-compromise / near-breach event.

At a time when the focus has been on adversaries that develop increasingly complex and sophisticated attacks, tried and true techniques such as compromised credentials continue to be amongst the most potent weapons. According to Verizon’s annual DBIR Report, 80 percent of confirmed data breaches involved weak, default or stolen passwords; or brute force credential compromises.

Read More
FOLLOW US

BLOG TOPICS

see all