Holger picture

Now is the Time To Rethink Your BYOD Security Strategy: Q&A with Cybersecurity Insiders Founder, Holger Schulze

As more companies embrace the Bring Your Own Device (BYOD) movement to accommodate a rapidly evolving workforce, one question comes to mind: How are IT and security leaders handling this sudden wave ...
The Future of Work is Hybrid  – Is Your Security Ready

The Future of Work is Hybrid – Is Your Security Ready?

It wasn’t that long ago that most of us used to work in an office. Fifteen months into the global COVID pandemic it’s now certain that the future will not be a ...
Private 5G, Wi-Fi, cyberattacks, nation-state, security, 5G networks, landscape, CISA SASE Security

The Role of 5G in Defining Cybersecurity Strategies

Increased availability and adoption of 5G technology means a more connected world, which in turn means more users with a greater variety of devices. While this means that IT security teams will ...
Security Boulevard
6.22.21 Blog - Blank

Ignorance is Bliss… for Hackers

Imagine standing in front of the CEO and company board of directors, asking them for a check for an obscene amount of money to pay off hackers that are holding critical data ...
6.9.21 Blog - Social

Will New Executive Order on Cybersecurity Fast Track Zero Trust?

On May 12, US President Biden issued a landmark executive order on Improving the Nation’s Cybersecurity that signals the need for governments and enterprises alike to boost their cyber defenses around the ...
SaaS and BYOD Malware or ATP

Malware in the Cloud: Odds Are You’re Infected

Malware attacks increased by 358% in 2020, while ransomware attacks, in particular, increased by 435%. Additionally, malware is targeting cloud apps more than ever before, and, at any given moment, 44% of ...
2021 Healthcare Breach Report Final_Page_1

The Healthcare Breach Report: Hacking and IT Incidents on the Rise

The vast majority of healthcare organizations utilize and store highly sensitive data, such as protected health information (PHI) and personal data such Social Security numbers, personal financial data, and more. For our ...
businessman hand working on laptop computer with digital layer business strategy and social media diagram on wooden desk-2

Thwarting Malware Attacks with Bitglass

As more and more data is stored in the cloud and companies enable BYOD and remote work, comprehensive threat protection against known and zero-day malware becomes a critical need. Unfortunately, even some ...
3-2

The Bitglass SASE Triangle: ZTNA for Internal Applications

Remote work, the remote workforce, working from home--all common phrases due to the series of unprecedented changes that have occured over the last several months. Organizations have had to adjust in order ...
2-2

The Bitglass SASE Triangle: SWG for Securing Web Traffic

In today’s modern workforce, the enterprise attack surface is larger than ever before; with cloud apps, personal devices, on-premises resources, web destinations, and more. As a result, organizations are in need of ...