Category: CipherCloud

The Cloud, The Breach, and the increased role of CSPM

Read the original article: The Cloud, The Breach, and the increased role of CSPM Cloud adoption has reached stratospheric levels, and with this increased volume of workloads and applications usage, organizations require tighter controls to protect their multi-cloud environments and…

Securing SAP SuccessFactors – Protecting Human Capital

Read the original article: Securing SAP SuccessFactors – Protecting Human Capital It goes without saying that your own organization’s most strategic cloud application is the most important cloud application when it comes to ensuring proper data protection. However, some clouds…

CipherCloud Chronicles #7: Spot Your Insider Threats

Read the original article: CipherCloud Chronicles #7: Spot Your Insider Threats Spot Your Insider Threats with UEBA and Insights Investigate             Previous Next “When companies had an insider threat, in general, they were much more…

CipherCloud Chronicles #6: Tackling Fat Finger Errors

Read the original article: CipherCloud Chronicles #6: Tackling Fat Finger Errors Securing Remote Collaboration – Tackling Fat Finger Errors             Previous Next John, who is REALLY enjoying working from home, gets a call from his…

Advancing Cloud DLP Through Smarter Policies

Read the original article: Advancing Cloud DLP Through Smarter Policies As Americans go to the polls this week, everyone is once again focused on matters of policy. When it comes down to it, no matter which candidate you support, most…

CipherCloud Chronicles #5: Insights Investigate

Read the original article: CipherCloud Chronicles #5: Insights Investigate Insights Investigate – Uncovering Bad Actors and Sources             Previous Next In today’s IT security environment, the work of uncovering “bad actors” and their nefarious sources…

CipherCloud Chronicles #4: Fishing Sensitive Data

Read the original article: CipherCloud Chronicles #4: Fishing Sensitive Data Fishing Historical Sensitive Data with CipherCloud CASB+ Data Discovery             Previous Next “History is who we are and why we are the way we are.”…

CipherCloud Chronicles #3: CASB Golf Court

Read the original article: CipherCloud Chronicles #3: CASB Golf Court   CASB Golf Court Interesting conversations happen over a cup of coffee or a game of sport. Chris and Kevin are acquaintances for years and are having an interesting conversation…

Introducing CipherCloud Data security-as-a-service (DSaaS)

Read the original article: Introducing CipherCloud Data security-as-a-service (DSaaS) By Sanjay Chetwani, Senior Director, Alliances & OEM at CipherCloud    With the adoption of technology across consumers and businesses, data as we know it will continue to increase quantity and…

Introducing CipherCloud Data security-as-a-service (DSaaS)

Read the original article: Introducing CipherCloud Data security-as-a-service (DSaaS) By Sanjay Chetwani, Senior Director, Alliances & OEM at CipherCloud    With the adoption of technology across consumers and businesses, data as we know it will continue to increase quantity and…

Securing the Multi-Cloud Environment through CSPM and SSPM

Read the original article: Securing the Multi-Cloud Environment through CSPM and SSPM By Ishani Sircar, Manager, Product Marketing at CipherCloud Misconfigurations are the biggest cause of data breaches in the cloud, exposing more than 33 billion records and costing companies…

Intelligence-Led Threat Protection for SaaS-Mobile Workforce

Read the original article: Intelligence-Led Threat Protection for SaaS-Mobile Workforce By Neeraj Nayak, Senior Manager, Product Marketing at CipherCloud   Integrating FireEye Detection On Demand with CipherCloud CASB+ Platform As organizations turn to cloud apps to support the remote workforce…

Five Step UEBA to Detect and Stop Insider Attacks

Read the original article: Five Step UEBA to Detect and Stop Insider Attacks By Ishani Sircar, Manager, Product Marketing at CipherCloud Every year, more than 34% of businesses worldwide are affected by insider threats. (Source: Sisa Infosec) Despite various investments…

Securing Data in Cloud Email and Messaging Applications

Read the original article: Securing Data in Cloud Email and Messaging Applications By Neeraj Nayak, Senior Manager, Product Marketing at CipherCloud   In April ’20 Google reported that, in a week’s time, it saw over 18 million daily malware and…

Securing Data in Cloud Email and Messaging Applications

Read the original article: Securing Data in Cloud Email and Messaging Applications By Neeraj Nayak, Senior Manager, Product Marketing at CipherCloud   In April ’20 Google reported that, in a week’s time, it saw over 18 million daily malware and…

GetSmart Session

Read the original article: GetSmart Session Test The post GetSmart Session appeared first on CipherCloud.   Advertise on IT Security News. Read the original article: GetSmart Session

Endpoint Device Controls for Secure Remote Working

Read the original article: Endpoint Device Controls for Secure Remote Working By Neeraj Nayak, Senior Manager, Product Marketing at CipherCloud   Endpoint security, today, has emerged as one of the biggest cybersecurity concerns in the industry. Due to the worldwide…

Endpoint Device Controls for Secure Remote Working

Read the original article: Endpoint Device Controls for Secure Remote Working By Neeraj Nayak, Senior Manager, Product Marketing at CipherCloud   Endpoint security, today, has emerged as one of the biggest cybersecurity concerns in the industry. Due to the worldwide…

9 mandates to secure your remote workforce

By Ishani Sircar, Product Marketing Manager at CipherCloud Are we in a cloud-first environment? Let us look at a regular workday- Few updates on Slack, followed by emails on Microsoft Outlook,  updating attendance on Workday, a few meetings with partners…

A Round-up of Data Breaches in March 2020

How Coronavirus leads to increasing cyberattacks The spread of COVID-19 has created a new wave of phishing and malware attacks, with bad actors looking to use this pandemic as a lure. According to researchers at Checkpoint, there have been over…

Secure Historical Cloud Data with Cloud Data Discovery

By Neeraj Nayak, Senior Manager, Product Marketing at CipherCloud In today’s era, a cloud-first strategy has become the new norm. Providing competitive advantage with improved business agility at lower infrastructure and deployment costs. Cloud services are gaining significant inroads in…

Secure Historical Cloud Data with Cloud Data Discovery

By Neeraj Nayak, Senior Manager, Product Marketing at CipherCloud In today’s era, a cloud-first strategy has become the new norm. Providing competitive advantage with improved business agility at lower infrastructure and deployment costs. Cloud services are gaining significant inroads in…

IT and Cyber Security Challenges in Healthcare Industry

By Salah Nassar, Vice President of Marketing, CipherCloud The sudden influx of remote workers due to Coronavirus pandemic has put a strain on business continuity. Many organizations have adopted Virtual Private Networks (VPN) to securely connect with the enterprise data…

Securely Work From Home With CASB

The world is witnessing an unseen and unprecedented trend in the past few weeks. While advanced persistent threats have caused an upward trend in data breaches and cyber crime, the introduction of a certain other virus has led multinationals across…

Securely Work From Home During COVID-19

The world is witnessing an unseen and unprecedented trend in the past few weeks. While advanced persistent threats have caused an upward trend in data breaches and cyber crime, the introduction of a certain other virus has led multinationals across…

A Round-up of Data Breaches in February 2020

Data Breach at Slickwraps exposes more than 857,000 customer accounts Slickwraps, a company developing customized vinyl skins for mobile phones, has suffered a data breach, exposing personal information of over 857,000 customers. Interestingly the systems were not breached by the…

A Round-up of Data Breaches in February 2020

Data Breach at Slickwraps exposes more than 857,000 customer accounts Slickwraps, a company developing customized vinyl skins for mobile phones, has suffered a data breach, exposing personal information of over 857,000 customers. Interestingly the systems were not breached by the…

RSA Conference 2020 Wrap-up: Human-Centric Security

By Salah Nassar, Vice President of Marketing, CipherCloud   Without a doubt, the top focus at the RSA Conference 2020 was human/people-centric security. This year’s conference messaging focused on the Human Element – which makes perfect sense. We are in…

RSA Conference 2020 Wrap-up: Human-Centric Security

By Salah Nassar, Vice President of Marketing, CipherCloud   Without a doubt, the top focus at the RSA Conference 2020 was human/people-centric security. This year’s conference messaging focused on the Human Element – which makes perfect sense. We are in…

CipherCloud wins at the prestigious InfoSec Awards 2020

In the recently released results by Cyber Defense Magazine, CipherCloud has been declared a winner at the prestigious 8th Annual Information Security Awards. The results were announced during RSA 2020 at San Francisco. This follows CipherCloud winning Cybersecurity Excellence Awards…

CipherCloud wins at the prestigious InfoSec Awards 2020

In the recently released results by Cyber Defense Magazine, CipherCloud has been declared a winner at the prestigious 8th Annual Information Security Awards. The results were announced during RSA 2020 at San Francisco. This follows CipherCloud winning Cybersecurity Excellence Awards…

New Feature Introductions in CASB+

Start of a new year and CipherCloud has released its latest version of Cloud Access Security Broker (CASB+) software that comes with new cloud security features in tune with the evolving definition of CASB, focusing on tightening the security controls…

New Feature Introductions in CASB+

Start of a new year and CipherCloud has released its latest version of Cloud Access Security Broker (CASB+) software that comes with new cloud security features in tune with the evolving definition of CASB, focusing on tightening the security controls…

A Round-up of Data Breaches in January 2020

Microsoft data breach – 250 million records exposed Microsoft has announced a data breach that has exposed 250 million customer records, spanning 14 years, without password protection. An investigation by Comparitech security research team has discovered five Elasticsearch servers containing…

A Round-up of Data Breaches in January 2020

Microsoft data breach – 250 million records exposed Microsoft has announced a data breach that has exposed 250 million customer records, spanning 14 years, without password protection. An investigation by Comparitech security research team has discovered five Elasticsearch servers containing…