UEBA
Strategies for Insider Threat Mitigation
In Part II of this blog series, we examine strategies for insider threat risk mitigation including key tenants of data visibility and advanced analytics to provide organizations a road map for addressing ...
Strategies for Insider Threat Mitigation
In Part II of this blog series, we examine strategies for insider threat risk mitigation including key tenants of data visibility and advanced analytics to provide organizations a road map for addressing ...
Diving Deeper: 4 Best Practices for Securing Enterprise Data in Office 365 (O365)
By Matt Hines, VP of Marketing at CipherCloud & Ishani Sircar, Product Marketing Manager at CipherCloud So, here we are, both as workers and employers. The COVID-19 environment hasn’t really changed ...
A Vantage Point to See Threats Before Impact
We recently observed another near-compromise / near-breach event. At a time when the focus has been on adversaries that develop increasingly complex and sophisticated attacks, tried and true techniques such as compromised ...
Visibility into the Unknown
The concept of enabling a dynamic workforce has shifted from a ?nice to have? to a mandate to help the organization remain productive. Many organizations ask how RSA, and more specifically RSA ...
CipherCloud Chronicles #1: Two Gentlemen & The Honking Car
Once upon a time, while driving to work- two gentlemen (the CEO and the CISO) were worried, very worried about the lack of visibility in the remote work environment. While they were ...
Five Step UEBA to Detect and Stop Insider Attacks
By Ishani Sircar, Manager, Product Marketing at CipherCloud Every year, more than 34% of businesses worldwide are affected by insider threats. (Source: Sisa Infosec) Despite various investments in security, most organizations are ...
Detect and Track Threats Through UEBA and Insights Investigate
By Ishani Sircar, Product Marketing Manager at CipherCloud The Rise of the Unmanaged Devices Most organisations are predicting an increased remote workforce and adoption of SaaS apps in the coming years. Remote ...
Census Security: How Protecting Complex Cloud Systems Aids in Accuracy
The U.S. Constitution mandates a decennial census of everyone living within the country. Results determine congressional districts, apportion congressional seats for each state and guide the transfer of nearly a trillion dollars ...
Bitglass: Deck the Cloud
With 2019 at its tail end, I can't help but reminisce on how eventful the year has been for the Bitglass family. We started the year by securing yet another round of ...

