Security and Visibility When Users Are Not in the Office

Secure Remote Worker Use Case 2: Security and Visibility of Data and Traffic As we now accept the new norm, combating malicious cyberthreats comes down to two things: visibility and control. If ...
cloud security

Data Loss Protection for the Hybrid Cloud

The post Data Loss Protection for the Hybrid Cloud appeared first on CCSI ...
Secure Remote Workforce

CipherCloud Chronicles #1: Two Gentlemen & The Honking Car

Once upon a time, while driving to work- two gentlemen (the CEO and the CISO) were worried, very worried about the lack of visibility in the remote work environment. While they were ...
Webinar Protect Sensitive Data on Box

Data Discovery to Rescue Historical Data from Compliance Violations

By Ishani Sircar, Manager, Product Marketing at CipherCloud As technology evolved and the world migrated to the cloud, the amount of data in the cloud increased at a rapid pace, and most ...
Email and App Security

How to secure cloud-based collaboration, emails, and messaging apps?

By Ishani Sircar, Manager, Product Marketing at CipherCloud We can secure information across multiple enterprise clouds Data leaks. Data breaches. Tighter security controls. Yet more breaches. A continuing cat-and-mouse-game. As both the ...
240_F_206735965_f0yd3HmUAlEUbtWQBjO7EFBUZx6cow4K

The Need for Comprehensive DLP in The Remote Workforce

Cloud adoption has granted unprecedented data accessibility over the years. As data continues its migration to the cloud, industries the world over are experiencing a vast increase in organizational productivity and efficiency ...
CipherCloud ChalkTalk - UEBA & Adaptive Access Controls

Five Step UEBA to Detect and Stop Insider Attacks

By Ishani Sircar, Manager, Product Marketing at CipherCloud Every year, more than 34% of businesses worldwide are affected by insider threats. (Source: Sisa Infosec) Despite various investments in security, most organizations are ...

Introducing Cloud App Isolation

Manage Shadow IT and Stop Data Loss Through Cloud Apps Cloud Apps Are a Point of Attack Protecting workers is a challenging task—for example, 29 percent of all attacks leverage legitimate cloud ...
Data Security and Threat Models

Data Security and Threat Models

This post is my admittedly imperfect attempt to “reconnect” data security controls to threats. It is also my intent to continue pulling on the thread I touched in this post — so expect more ...
Musings on Modern Data Security

Musings on Modern Data Security

As I am expanding my responsibilities to cover some exciting data security topics (like, say, our cloud data discovery DLP), I wanted to briefly discuss a few broader issues I have noticed ...