Gartner Calls Out CASB Among the Top 11 Security Technologies at its Security & Risk Management Summit 2017

CASB, Gartner, Security Technology 1 Comment

It was great representing CipherCloud at the Gartner Security & Risk Management Summit 2017 last week in National Harbor, Maryland. I had a chance to speak with a number of IT / security professionals and business owners from various companies. Throughout the conference, I was frequently asked the following questions: What model do your customers use to help pass compliance …

GDPR and the Cloud: 6 Key Points You Need to Know

Cloud Data Protection, GDPR, General Data Protection 1 Comment

The clock is ticking and the GDPR is coming to a jurisdiction near you. Although it was created by the EU, most businesses realize that the General Data Protection Regulation, which takes effect in May 2018, will have global reach, covering not just data in Europe, but the personal information of European citizens and residents – wherever it is globally. …

Unprotected File Sharing Gets Expensive

Compliance, HealthCare, Healthcare Information

A Recent $2 Million HIPAA Penalty for Exposed Patient Data If you work in a health care organization and handle sensitive patient health data, you’ve probably heard about the recent case in which US regulators hit St. Joseph Health System with a penalty of $2.14 million for HIPAA violations. That penalty is just the tip of the iceberg: St. Joseph …

Rocks stacked in the corner of a brick wall

Data Protection: The Cloud Security Cornerstone

Cloud Data Security

Not Your Grandma’s IT Security Concern Not that long ago, the main concern of network security professionals was protecting the company’s network perimeter. Servers, not data, was the issue. When the cloud rolled in, the IT security landscape began to change profoundly. When companies use cloud services, effectively they’re outsourcing the care of their data. Unfortunately, they can’t outsource their …

horse and rider soar over city

Recognized Leadership vs Claims of Leadership

Announcements, CASB

Getting Beyond the Noise Technology products often are overhyped, and products in the CASB space are no exception. CASB players proliferate amid an abundance of venture money and self-proclaimed market and technology leadership. Customers rely on competitive analysis from independent sources to cut through the noise and provide a clear picture of what vendors really have to offer. The first …

goalkeeper blocks soccer ball

Cloud Data Isn’t Lazy Data

Cloud Data Protection

Why your cloud security strategy shouldn’t rely solely on data-at-rest encryption In our last blog post, we revealed that cloud provider “Bring Your Own Keys” (BYOK) options merely let customers keep a copy of their keys, not own the whole set of keys. In this post, we’ll look at the SaaS application environment in detail to understand why data-at-rest encryption …

Hardware store clerk with keys

Does BYOK Mean ‘Barely Your Own Keys’?

Cloud, Compliance

3 Truths about Encryption and BYOK Many people making important decisions about data security have a fuzzy understanding of how encryption actually works. Their confusion can easily be exploited by hackers, governments, and vendors pushing incomplete solutions. That’s because, on the surface, encryption seems reasonably easy to understand with real-world analogies to keys, locks, secrets (both good and bad), and …

Putting the “S” in CASB ­­­­­— Safeguarding Cloud File Sharing

CASB

As we have discussed in a recent blog post Cloud File Sharing has big rewards and big risks. Driven by workforce trends that have teams spread across the globe both internal users and external partners need to share information anytime, anywhere to be effective. Understanding the Risks It is inevitable that users will turn to file sharing clouds like Box, …