Use a CASB to Protect Your PII and PCI No Matter Where It Is or How It Got There


Data is everywhere. It’s in databases, both behind your firewalls and in the cloud. It’s in documents downloaded onto employee phones and tablets. It’s in files shared with third-parties via file sharing systems. Personal Identifiable Information (PII) and Payment Card Information (PCI) is found in files and databases and can leak to all these places. And that’s just when it’s …

3 Key Factors for Data Privacy & Enterprise Cloud Adoption

cloud data privacy

When it comes to enterprise cloud adoption, one critical risk area to understand is cloud data privacy. IT and security professionals need to evaluate the relative privacy risk of various cloud solutions in order to select the best option for their organizations. Evaluating a range of cloud data privacy risks associated with the adoption of enterprise clouds for CRM, ITSM …

Why National Borders and Regulations are not Enough to Ensure Cloud Data Privacy

cloud data privacy

Concerns about government agencies’ surveillance of private corporations’ digital data and communications have been top of mind since U.S. government passed the Patriot Act in the wake of the 9/11 terrorist attacks. Add Edward Snowden blowing the lid off National Security Agency (NSA) domestic spying activities in 2013, and cases like the U.S. Department of Justice search warrant seeking access …

4 pillars CASB Checklist

Pillars to Lean On: Self-Evaluation & Checklist When Evaluating CASB


If you aren’t thinking about deploying a cloud access security broker (CASB), you may be falling behind the technology curve. Gartner predicts that 85% of large enterprises will be using CASB by 2020. That’s because the growth of cloud usage is exponential, along with the associated security risks. While cloud providers offer tools to manage access and a smaller number …

6 steps eu safe harbor

6 Steps to Take Now that EU Safe Harbor Is Not the Only Game In Town

EU Safe Harbor

When the European Court of Justice invalidated the EU Safe Harbor framework, it put all data transfers based on Safe Harbor self-certification in legal limbo. While the ruling doesn’t require that those transfers cease, it means there no longer is any legal authorization for those data transfers. Without Safe Harbor, gaining approval for data transfers from the EU requires approval …

2015 Most Popular Cloud Security Blogs – Keep Up with What’s Hot

Cloud Security

Keeping up with what’s happening in the technology industry is a lot of work – and time-consuming! There’s an endless stream of newsletters, journals, blog posts, and press releases. How do you know what’s important enough to read? One way is to save time and brush up on what everyone elseis reading. At least that way, you can know what they know …

Will There Be a New EU Safe Harbor? Don’t Let the Suspense Stop You From Taking Action

EU Safe Harbor 0 Comments

The Internet makes sending data from the EU to US easy. Making that data transfer compliant, well, that’s not so simple. The data protection laws differ among the EU member states, and getting approval from each nation’s Data Protection Authority (DPA) could be time consuming and complex. That’s where the EU Safe Harbor agreement came in; companies that self-certified for …

Six Reasons Why Encryption Back Doors Won’t Deter Terrorists

Cloud Data Protection, Cloud Security

Last month’s tragic events in Paris, and fears over similar terrorist attacks around the world, have revived a long-standing debate. Early evidence suggests that the terrorists used a readily available encryption app to hide their plans and thwart detection by law enforcement. This has led to finger-pointing by intelligence officials and politicians demanding that something be done to control this dangerous technology. Keep …

cloud encryption trends and predictions

Cloud Encryption Trends & Predictions for 2016: Taking a Proactive Approach to Data Protection

Cloud Encryption

Whether or not you make New Year’s resolutions in your personal life, every business leader should review corporate plans and revise strategies for the new year. So much of business planning is about growth; it’s easy to forget about protecting your company’s valuable business assets. This includes myriad types of data organizations store, transmit, process and generate. And consumers are …

The 5C’s of US-EU Safe Harbor: From Consensus to Collapse and Continuing On

EU Safe Harbor 0 Comments

The world’s modern economy is largely based on free trade, with goods moving easily between countries. With the development of the Internet, the free movement of information has become crucial to business as well. Thousands of American companies share data with European partners, but the smooth flow of information is complicated by the two continents’ differing perspectives on data privacy. …