Over the last couple of years, Cloud Access Security Brokers (CASBs) have burst on the scene as a way of controlling organizations’ data and maintaining security in the cloud. As more and more companies move to the cloud, adopt BYOD policies, and contend with their employees’ use of file sync-and-share applications (whether company-sanctioned or not), CASBs have become increasingly important in managing the proliferation of information.Read more »
In our time building security solutions for consumers, small-to-medium businesses, and enterprises, one of the things we’ve found most striking is the difference in mindset among these types of organizations.
You might see it when reading between the lines every time there’s a new data breach in the news. The message? Even with a security budget that can fund a small country, there are enterprises out there who don’t take security seriously because they’ve deemed it cheaper for them to deal with a breach than to spend money on the infrastructure to prevent it.Read more »
If you’re like us, you might have been tempted to roll your eyes when you read the Office of Personnel Management’s post-mortem on its enormous breach last summer, which said that it had so much trouble controlling its data because employees simply couldn’t keep track of it all. It turns out that an incomplete inventory of all of OPM’s servers, databases, and network devices—let alone the files stored there—led to the drastically diminished effectiveness of the organization’s security measures. It also led to the breach of 22 million people’s records. It’s unacceptable. But let’s face it: This problem isn’t unique to OPM, and the cloud is only exacerbating these visibility problems. Organizations are migrating their businesses to the cloud, but there seems to be an increasing level of panic over the current state of affairs. There are some things savvy security professionals must keep in mind to prevent this problem from getting out of control. Here are a few of these security tips.Read more »
As data breaches become increasingly commonplace, companies have increasingly turned to encryption technology to keep their data secure. A new study published by the Ponemon Institute surveyed 5,000 companies to see exactly why companies are adopting encryption solutions. The largest adoption driver—at 61 percent—was the need to comply with federal regulations such as HIPAA, FERPA, PCI DSS, and others.Read more »
truly holistic, with tools to detect risks on Google Drive, protect important data, and enforce security policies.
Read more »