Strategies for Insider Threat Mitigation

In Part II of this blog series, we examine strategies for insider threat risk mitigation including key tenants of data visibility and advanced analytics to provide organizations a road map for addressing ...

Strategies for Insider Threat Mitigation

In Part II of this blog series, we examine strategies for insider threat risk mitigation including key tenants of data visibility and advanced analytics to provide organizations a road map for addressing ...

Diving Deeper: 4 Best Practices for Securing Enterprise Data in Office 365 (O365)

By Matt Hines, VP of Marketing at CipherCloud & Ishani Sircar, Product Marketing Manager at CipherCloud    So, here we are, both as workers and employers. The COVID-19 environment hasn’t really changed ...
Businesswoman holding tablet pc entering password. Security concept

A Vantage Point to See Threats Before Impact

We recently observed another near-compromise / near-breach event. At a time when the focus has been on adversaries that develop increasingly complex and sophisticated attacks, tried and true techniques such as compromised ...

Visibility into the Unknown

The concept of enabling a dynamic workforce has shifted from a ?nice to have? to a mandate to help the organization remain productive. Many organizations ask how RSA, and more specifically RSA ...
Secure Remote Workforce

CipherCloud Chronicles #1: Two Gentlemen & The Honking Car

Once upon a time, while driving to work- two gentlemen (the CEO and the CISO) were worried, very worried about the lack of visibility in the remote work environment. While they were ...
CipherCloud ChalkTalk - UEBA & Adaptive Access Controls

Five Step UEBA to Detect and Stop Insider Attacks

By Ishani Sircar, Manager, Product Marketing at CipherCloud Every year, more than 34% of businesses worldwide are affected by insider threats. (Source: Sisa Infosec) Despite various investments in security, most organizations are ...
Insights Investigate

Detect and Track Threats Through UEBA and Insights Investigate

By Ishani Sircar, Product Marketing Manager at CipherCloud The Rise of the Unmanaged Devices Most organisations are predicting an increased remote workforce and adoption of SaaS apps in the coming years. Remote ...
census

Census Security: How Protecting Complex Cloud Systems Aids in Accuracy

The U.S. Constitution mandates a decennial census of everyone living within the country. Results determine congressional districts, apportion congressional seats for each state and guide the transfer of nearly a trillion dollars ...
Security Boulevard
Happy holidays from bitglass

Bitglass: Deck the Cloud

With 2019 at its tail end, I can't help but reminisce on how eventful the year has been for the Bitglass family. We started the year by securing yet another round of ...