Integrating CASB with DLP

Glass Class: Integrating CASB with DLP

Most organizations withhold extremely sensitive data, and to prevent that information from leaking externally, they have turned to data loss prevention (DLP) tools. In the past, these organizations would apply DLP tools ...
Appeasing the Oasis of Unknown: Shadow IT Discovery

Appeasing the Oasis of Unknown: Shadow IT Discovery

In a sea of millions of apps, which one is the biggest fish to fry? Firewall and proxy logs catch the traffic of users, but identifying what needs attention in such comprehensive ...
The Four Pillars of CASB: Visibility

The Four Pillars of CASB: Visibility

Due to the overwhelming amount of data exfiltration, auxiliary CASBs (cloud access security brokers) primarily focus on shadow IT discovery. While blocking unsanctioned apps sounds like the right approach, employees not having ...
Aimee Laurence

Drastic Cloud Security Mistakes No One Should Make

The post Drastic Cloud Security Mistakes No One Should Make appeared first on CCSI ...
Gartner: SASE Poised to Transform Cybersecurity

Gartner: SASE Poised to Transform Cybersecurity

Research firm Gartner is lending credence to a promising technology called secure access service edge (SASE). SASE is an emerging, disruptive technology that strives to create a secure cloud environment that is ...
Security Boulevard
Bitglass Security Spotlight: A Step-By-Step Guide To Breach Instagram

Bitglass Security Spotlight: A Step-By-Step Guide To Breach Instagram

Here are the top stories of recent weeks: Hacker Demonstrates his Step-By-Step Process to Breach Instagram’s Login Module Uber Security Flaw Enables Threat Actors to Hitch a Ride, at Your Expense Cyber ...
Cloud Application Security Checklist Blog CTA XXL

Where Cloud Security Fits In Your Cybersecurity Infrastructure

A Multi-Layered Cybersecurity Infrastructure Protects Data Both Inside and Outside Your Network Everyone is aware that cybersecurity is critical for all types and sizes of organizations. But with cloud computing being relatively ...
How to Detect Malware

Glass Class: How to Detect Malware

Malware can be a serious threat to organizations that don't have the proper security tools to protect against it. Some forms of malware can force enterprises to pay sums of dollars, freeze ...
Effective Cybersecurity Requires Threat Intelligence and Comprehensive Visibility

Effective Cybersecurity Requires Threat Intelligence and Comprehensive Visibility

Qualys is a sponsor of TechSpective Technology and cybersecurity are constantly changing and evolving—as are the tools, techniques and processes used by cyber attackers. Just because something may have been relatively effective ...

5 Network Security Takeaways from the 2019 Threatscape Report

The new threatscape report by Accenture iDefense highlights five factors shaping the cyberthreat landscape – and we reviewed it to surface those most related to network security ...
Loading...