Rocks stacked in the corner of a brick wall

Data Protection: The Cloud Security Cornerstone

Cloud Data Security

Not Your Grandma’s IT Security Concern Not that long ago, the main concern of network security professionals was protecting the company’s network perimeter. Servers, not data, was the issue. When the cloud rolled in, the IT security landscape began to change profoundly. When companies use cloud services, effectively they’re outsourcing the care of their data. Unfortunately, they can’t outsource their …

Hardware store clerk with keys

Does BYOK Mean ‘Barely Your Own Keys’?

Cloud, Compliance

3 Truths about Encryption and BYOK Many people making important decisions about data security have a fuzzy understanding of how encryption actually works. Their confusion can easily be exploited by hackers, governments, and vendors pushing incomplete solutions. That’s because, on the surface, encryption seems reasonably easy to understand with real-world analogies to keys, locks, secrets (both good and bad), and …

2015 Most Popular Cloud Security Blogs – Keep Up with What’s Hot

Cloud Security

Keeping up with what’s happening in the technology industry is a lot of work – and time-consuming! There’s an endless stream of newsletters, journals, blog posts, and press releases. How do you know what’s important enough to read? One way is to save time and brush up on what everyone elseis reading. At least that way, you can know what they know …

cloud security data loss prevention featured image

Cloud Security 101: DLP Blind Spots and How to Fix Them

Cloud Security

Data loss prevention (DLP) is an integral part of an enterprise’s data security architecture. As more and more sensitive data enters the cloud, the risks of inappropriate and often inadvertent data sharing, data leakage, or data exposure grow exponentially. DLP solutions are powerful mechanisms for preventing such disasters. But the cloud throws a wrench in enterprise attempts to prevent data …

How CASBs Mitigate Cloud Computing Disadvantages


For proponents of enterprise cloud computing, it can be hard to admit that there are disadvantages to cloud computing. It’s easier (and more exciting) to focus on the advantages, like increased agility, flexibility, and scalability or the significantly decreased capital and operational costs most cloud adopters expect. There are, however, some cloud computing disadvantages that organizations must keep in mind …

2015 Black Hat – What to Look Forward to at the Event


Next week is the Black Hat conference again, the annual gathering of the best hackers and security professionals around the world. I will be in attendance with my CipherCloud colleagues. I am running a panel at codenomiCon, and we’ll be exhibiting our products on the show floor, at booth #766. I always enjoy going to the Black Hat conference. Even …

CipherCloud’s 2015 Cloud Security Predictions


More Sony-like hacks ahead It all started with the Target breach disclosure and executive suite fall-out, security moved up as a boardroom issue. Similarly, Sony was the master breach of 2014 that keeps on giving. The breadth of the Sony breaches and the company’s underwhelming cyber attack preparation have surprised everyone. Here is a profitable multi-national with tech roots but …


Data Protection and Cloud Security in a Shadow IT World: New GigaOm Research Report

Cloud Security, Shadow IT

As you may have noticed, we’ve been talking about shadow IT a lot in this space. It’s for good reason: Of all the security threats facing the enterprise today, shadow IT is becoming one of the biggest ones, yet its problems some of the most preventable. It’s amazing how easily employees and lines of business can adopt SaaS applications without …


For Total Cloud Data Protection, Companies Must Gain Control of Shadow IT

Cloud Data Protection, Shadow IT

Think fast! How much of a problem is shadow IT at your organization? If you answered “not much” or “not at all,” then we have an unpleasant surprise for you. According to a recent report by 451 Research an estimated that 79% of employees use shadow IT applications. So unless you’ve taken steps to identify and address shadow IT in …