Equifax Breach: 143 million identities stolen, 1 lesson to learn… SaaS and IaaS Cloud provider encryption is NOT enough to secure your data.

Cloud Data Protection, Cloud Encryption, Uncategorized 0 Comments

Equifax Breach: 143 million identities stolen, 1 lesson to learn… SaaS and IaaS cloud provider encryption is NOT enough to secure your data. If you are an American with a credit history, chances are that you are impacted by the latest data breach fiasco, i.e. the Equifax breach. Although data breaches have flooded the news for the past couple of …

Equifax hack exposes substantial gaps in the U.S. Privacy Laws

Cloud Data Protection, Cloud Data Security 0 Comments

As Equifax scrambles to address the massive damage the recent data breach caused, affecting 143 million U.S. consumers and leaving them vulnerable to identity theft for their entire lives, one cannot help but think about why it was allowed to happen in the first place. Why Equifax did not face the constant monitoring and auditing that the banks do? Why …

Data Access Control With Customer Controlled Encryption, in a Control Multi-Cloud Environment

CASB, Cloud Data Security, Encryption Key 0 Comments

How does a Cloud Access Security Broker (CASB) ensure cloud security? It’s all about having visibility into how enterprise data is getting used in and from the cloud, thereby controlling access to it. Multi-Cloud Environment Organizations all over the world are transitioning to a multi-cloud environment and it is important to gain visibility within these clouds. In this day and …

3 Key Business Challenges Solved by a CASB Solution

CASB, Cloud Data Protection, Gartner 0 Comments

The right CASB can offer solutions to data protection and compliance challenges that customers are confronted with everyday. Three most common issues customers face are: Not having visibility into unsanctioned cloud applications Challenge We often hear from our customers that when they migrate to the cloud they lose visibility of sensitive and regulated data. It is critical to understand the …

5 Steps to Data Protection for GDPR

Cloud Data Protection, GDPR, General Data Protection 0 Comments

Global Data Protection Regulation (GDPR) is an extension of past privacy laws, but much stronger, much tougher consequences and much clearer, more explicitly about what needs to be done to protect data.  The follow steps to GDPR compliance: Know Your Cloud Footprint The first step to compliance with GDPR is to know your cloud footprint. This sounds obvious, but the …

Gartner Calls Out CASB Among the Top 11 Security Technologies at its Security & Risk Management Summit 2017

CASB, Gartner, Security Technology 1 Comment

It was great representing CipherCloud at the Gartner Security & Risk Management Summit 2017 last week in National Harbor, Maryland. I had a chance to speak with a number of IT / security professionals and business owners from various companies. Throughout the conference, I was frequently asked the following questions: What model do your customers use to help pass compliance …

GDPR and the Cloud: 6 Key Points You Need to Know

Cloud Data Protection, GDPR, General Data Protection 1 Comment

The clock is ticking and the GDPR is coming to a jurisdiction near you. Although it was created by the EU, most businesses realize that the General Data Protection Regulation, which takes effect in May 2018, will have global reach, covering not just data in Europe, but the personal information of European citizens and residents – wherever it is globally. …

Unprotected File Sharing Gets Expensive

Compliance, HealthCare, Healthcare Information

A Recent $2 Million HIPAA Penalty for Exposed Patient Data If you work in a health care organization and handle sensitive patient health data, you’ve probably heard about the recent case in which US regulators hit St. Joseph Health System with a penalty of $2.14 million for HIPAA violations. That penalty is just the tip of the iceberg: St. Joseph …

Rocks stacked in the corner of a brick wall

Data Protection: The Cloud Security Cornerstone

Cloud Data Security

Not Your Grandma’s IT Security Concern Not that long ago, the main concern of network security professionals was protecting the company’s network perimeter. Servers, not data, was the issue. When the cloud rolled in, the IT security landscape began to change profoundly. When companies use cloud services, effectively they’re outsourcing the care of their data. Unfortunately, they can’t outsource their …