Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Technology

20 Most Common CASB Use Cases

As people and organizations adopt cloud services, Cloud Access Security Brokers (CASBs) have become a must-have for any information security team. CASBs provide critical capabilities such as governing access and activities in sanctioned and unsanctioned cloud services, securing sensitive data and preventing its loss, and protecting against internal and external threats.

With Forseti, Spotify and Google release GCP security tools to open source community

Being able to secure your cloud resources at scale is important for all Google Cloud Platform users. To help ensure the security of GCP resources, you need to have the right tools and processes in place. Spotify and Google Cloud worked together to develop innovative security tools that help organizations protect GCP projects, and have made them available in an open source community called Forseti Security. Forseti is now open to all GCP users!

EU GDPR Cloud-Readiness and Compliance Checklist

The new set of European Union laws regarding personal data security in organisations, the EU General Data Protection Regulation (GDPR), has passed and requires organisations be compliant by 2018. As organisations start taking action to comply with the GDPR within the deadline, one of the most difficult areas is the cloud.

Allow is the New Block - 10 Requirements to Safely Say "Yes" to Shadow IT

Given the lack of visibility and control, what does the security team do about shadow IT? Do they take extreme security measures and try to block them using legacy security tools or do they allow their use and hope users stay secure from threats and don't leak sensitive data?

Cybersecurity Predictions: Your phone matters more than your password

The password may be one of the worst security elements we have. They are oftentimes easily guessed because we, as humans, are generally pretty bad at creating and remembering them. So, we use weak passwords across multiple accounts. We use simple passwords like “123456” or “password.” The industry is also yet to find something better. The phone, however, presents new and exciting ways for companies to protect their accounts, which means the phone is also become a critical part of the hacker “kill chain.”