DLP
Security and Visibility When Users Are Not in the Office
Secure Remote Worker Use Case 2: Security and Visibility of Data and Traffic As we now accept the new norm, combating malicious cyberthreats comes down to two things: visibility and control. If ...
Data Loss Protection for the Hybrid Cloud
The post Data Loss Protection for the Hybrid Cloud appeared first on CCSI ...
CipherCloud Chronicles #1: Two Gentlemen & The Honking Car
Once upon a time, while driving to work- two gentlemen (the CEO and the CISO) were worried, very worried about the lack of visibility in the remote work environment. While they were ...
Data Discovery to Rescue Historical Data from Compliance Violations
By Ishani Sircar, Manager, Product Marketing at CipherCloud As technology evolved and the world migrated to the cloud, the amount of data in the cloud increased at a rapid pace, and most ...
How to secure cloud-based collaboration, emails, and messaging apps?
By Ishani Sircar, Manager, Product Marketing at CipherCloud We can secure information across multiple enterprise clouds Data leaks. Data breaches. Tighter security controls. Yet more breaches. A continuing cat-and-mouse-game. As both the ...
The Need for Comprehensive DLP in The Remote Workforce
Cloud adoption has granted unprecedented data accessibility over the years. As data continues its migration to the cloud, industries the world over are experiencing a vast increase in organizational productivity and efficiency ...
Five Step UEBA to Detect and Stop Insider Attacks
By Ishani Sircar, Manager, Product Marketing at CipherCloud Every year, more than 34% of businesses worldwide are affected by insider threats. (Source: Sisa Infosec) Despite various investments in security, most organizations are ...
Introducing Cloud App Isolation
Manage Shadow IT and Stop Data Loss Through Cloud Apps Cloud Apps Are a Point of Attack Protecting workers is a challenging task—for example, 29 percent of all attacks leverage legitimate cloud ...
Data Security and Threat Models
This post is my admittedly imperfect attempt to “reconnect” data security controls to threats. It is also my intent to continue pulling on the thread I touched in this post — so expect more ...
Musings on Modern Data Security
As I am expanding my responsibilities to cover some exciting data security topics (like, say, our cloud data discovery DLP), I wanted to briefly discuss a few broader issues I have noticed ...
