Appeasing the Oasis of Unknown: Shadow IT Discovery

Appeasing the Oasis of Unknown: Shadow IT Discovery

In a sea of millions of apps, which one is the biggest fish to fry? Firewall and proxy logs catch the traffic of users, but identifying what needs attention in such comprehensive ...

4 Questions to Take Your Cloud Security Posture Management (CSPM) to the Next Level

Data breaches through mismanagement and misconfigurations in the cloud are becoming commonplace. Gartner has predicted that “through 2022, at least 95% of cloud security failures will be the customer’s fault.” In fact, ...
Digital Transformation, Cybersecurity, Cloud Apps, and Cloud Security

Digital Transformation, Cybersecurity, Cloud Apps, and Cloud Security

What you see in the title is what we covered in our latest webinar, but what part of it is really important? All of it? Some? Or is it all just marketing ...
An Old Dog With New Tricks

An Old Dog With New Tricks

I’ve been in cybersecurity for over two decades, mostly with major vendors on the selling/marketing/building/evangelizing side. I was a VP at one major firewall vendor, a consultant to new startups and a ...
Bitglass Security Spotlight: Google Issues Warning For 2 Billion Users

Bitglass Security Spotlight: Google Issues Warning For 2 Billion Users

Here are the top stories of recent weeks: Google Issues Warning For 2 Billion Users 33,000 Patients Medical Records Affected by AMCA Data Breach The Presbyterian Healthcare System Breached Via Phishing Scam ...
Bitglass Security Spotlight: iPhones Susceptible to a Hack via Text

Bitglass Security Spotlight: iPhones Susceptible to a Hack via Text

Here are the top stories of recent weeks: iPhones Susceptible to a Hack via Text Democratic Senate campaign group exposed emails of 6.2 million Americans State Farm says Hackers Successfully Conducted a ...
The Black Hat Experience with Bitglass

The Black Hat Experience with Bitglass

Following a six-day Vegas experience, I thought it would be interesting to reflect on all the insight and knowledge gained from almost a week of eating, sleeping, and breathing cloud security. As ...
3 Essential Requirements for Securing IaaS

Glass Class: Three Essential Requirements for Securing IaaS

In today's cloud-first world, organizations have been utilizing infrastructure as a service (IaaS) to better benefit their operations. Using tools like AWS, GCP, or Azure allows organizations to focus on business growth, ...
Bitglass Sales Kick-Off – Fun, Concise, and Effective!

Bitglass Sales Kick-Off – Fun, Concise, and Effective!

Over the last 18 years, I have been to more than 40 SKO events in cybersecurity for numerous companies as either a sponsor or an attendee. Bitglass has certainly raised the bar ...
Bitglass Security Spotlight: Capital One Suffers Data Breach Affecting 100 Million Customers

Bitglass Security Spotlight: Capital One Suffers Data Breach Affecting 100 Million Customers

Here are the top cybersecurity stories of recent weeks: Capital One data breach compromises 100 million accounts Dark web trades over 23 million stolen credit cards Facebook to pay $5 billion fine ...
Loading...