Equifax Breach: 143 million identities stolen, 1 lesson to learn… SaaS and IaaS Cloud provider encryption is NOT enough to secure your data.

Cloud Data Protection, Cloud Encryption, Uncategorized 0 Comments

Equifax Breach: 143 million identities stolen, 1 lesson to learn… SaaS and IaaS cloud provider encryption is NOT enough to secure your data. If you are an American with a credit history, chances are that you are impacted by the latest data breach fiasco, i.e. the Equifax breach. Although data breaches have flooded the news for the past couple of …

Equifax hack exposes substantial gaps in the U.S. Privacy Laws

Cloud Data Protection, Cloud Data Security 0 Comments

As Equifax scrambles to address the massive damage the recent data breach caused, affecting 143 million U.S. consumers and leaving them vulnerable to identity theft for their entire lives, one cannot help but think about why it was allowed to happen in the first place. Why Equifax did not face the constant monitoring and auditing that the banks do? Why …

3 Key Business Challenges Solved by a CASB Solution

CASB, Cloud Data Protection, Gartner 0 Comments

The right CASB can offer solutions to data protection and compliance challenges that customers are confronted with everyday. Three most common issues customers face are: Not having visibility into unsanctioned cloud applications Challenge We often hear from our customers that when they migrate to the cloud they lose visibility of sensitive and regulated data. It is critical to understand the …

Gartner Calls Out CASB Among the Top 11 Security Technologies at its Security & Risk Management Summit 2017

CASB, Gartner, Security Technology 1 Comment

It was great representing CipherCloud at the Gartner Security & Risk Management Summit 2017 last week in National Harbor, Maryland. I had a chance to speak with a number of IT / security professionals and business owners from various companies. Throughout the conference, I was frequently asked the following questions: What model do your customers use to help pass compliance …

Rocks stacked in the corner of a brick wall

Data Protection: The Cloud Security Cornerstone

Cloud Data Security

Not Your Grandma’s IT Security Concern Not that long ago, the main concern of network security professionals was protecting the company’s network perimeter. Servers, not data, was the issue. When the cloud rolled in, the IT security landscape began to change profoundly. When companies use cloud services, effectively they’re outsourcing the care of their data. Unfortunately, they can’t outsource their …

goalkeeper blocks soccer ball

Cloud Data Isn’t Lazy Data

Cloud Data Protection

Why your cloud security strategy shouldn’t rely solely on data-at-rest encryption In our last blog post, we revealed that cloud provider “Bring Your Own Keys” (BYOK) options merely let customers keep a copy of their keys, not own the whole set of keys. In this post, we’ll look at the SaaS application environment in detail to understand why data-at-rest encryption …

cloud data protection 101

Cloud Data Protection 101: Data Classification

Cloud Data Protection, Cloud Security

When it comes to protecting your sensitive customer and corporate data in the cloud, encryption and tokenization will no doubt be two of the most important weapons in your arsenal. But before you can begin applying them (along with your other cloud data protection tools) to your data, you’ll need to know where to encrypt and where to tokenize, and …

shocking shadow IT statistic

The Most Shocking Statistic about Shadow IT, and What It Means for Cloud Data Security

Cloud Data Security, Shadow IT

SaaS and the consumerization of IT have revolutionized enterprise computing. No longer do organizations and their employees have to rely solely on internal infrastructure for their IT needs, and no longer are they restricted by the limitations of that internal infrastructure. But with SaaS and the consumerization come the dangerous phenomenon of shadow IT. Employees who adopt whatever SaaS applications …