To BYOD or Not BYOD

To BYOD or Not BYOD? Let Your Risk Decide

Before the iPhone came to town, BlackBerry was all the rage. No one had smartphones, but all the cool people had a BlackBerry. Technology evolved, and it was soon out with the ...
Security Boulevard
How to Do the Impossible and Secure BYOD

How to Do the Impossible and Secure BYOD

The use of cloud tools in the enterprise is becoming increasingly common, enabling employees to collaborate and work incredibly efficiently. On top of this, when employees are allowed to work from their ...

To Err is Human: Cybersecurity Training Your Employees

As we come to the end of cyber security month – we must admit to ourselves that to err is human. You can employ the latest technology at your company to bolster ...
Office 365 and the Long Tail of SaaS Apps at Gartner Symposium

Office 365 and the Long Tail of SaaS Apps at Gartner Symposium

Bitglass just attended the Gartner Symposium & ITxpo in Orlando, Florida, where we had a fantastic time. With more and more companies moving to the cloud, people were eager to learn about ...
MSFT Azure AD Conditional Access vs CASB

MSFT Azure AD Conditional Access vs CASB

| | agents, byod, CASB, Office 365 Security
For many organizations, the move to the cloud means many more ways for employees to access sensitive data. The days of the corporate-issued laptop on the network (or VPN) being the only ...
Data Breaches on the Rise in Financial Services

Data Breaches on the Rise in Financial Services

Financial services organizations are a prime target for hackers looking to steal and sell valuable data. This is because these firms handle sensitive information known as PII, personally identifiable information, as well ...
Cloud Access Security Brokers and Cyber Security Chicago

Cloud Access Security Brokers and Cyber Security Chicago

Recently, Bitglass participated in the Cyber Security Conference in Chicago. At our booth, we were listening to customer stories about how they are strengthening their cybersecurity and adapting to changing technological trends; ...
Protecting Data on the Move

How to Protect Data in a BYOD World

Every day, more and more corporate information is moving to employees' personal devices. This rise of BYOD (bring your own device) provides increased flexibility and productivity to employees and, consequently, the organizations ...
Translating Cybersecurity Jargon to English

Translating Cybersecurity Jargon to English

You don’t need to be technologically savvy to be able to understand cybersecurity. All you need is someone with deeper insights to explain it using friendly, everyday vocabulary. I established my writing ...
Risk of Using Old Technology

Old Technology: We All Use It, But At What Risk?

How old technology may be introducing security risks to the corporate network We may think of today’s corporate America as a mobile workforce, with everybody conducting business from their phones or tablets ...
Security Boulevard
Loading...