SecurityBrief New Zealand logo
New Zealand's leading source of cybersecurity and cyber-attack news

Bitglass news stories - Page 2

Story image
Cloud
Ransomware ravages Ireland's health service - experts comment
Ireland’s National Cyber Security Centre points to the ‘Conti’ ransomware variant, which caused the HSE's IT systems to shut down over the weekend.
Story image
Cybersecurity
Best practices and key factors for identity management
In parallel with any physical form of identification, digital identities must be protected at all costs to prevent identity theft or fraud.
Story image
Cloud Security
Why uptime and performance are key to cloud security
The cloud has virtually infinite redundancy, storage and compute power, so why reinvent it? True cloud security should be delivered from the cloud itself.
Story image
Cybersecurity
Six key characteristics of a modern secure web gateway
For organisations to continue to thrive in a distributed work environment, they must ensure that security is also modernised to support new realities appropriately.
Story image
Microsoft
Major firms disclose breaches in the wake of SolarWinds attack
Microsoft, Shell, GoDaddy, MobiKwik — these are just some of the high-profile company's on the receiving end of sophisticated attacks, writes Bitglass senior director of marketing Jonathan Andresen.
Story image
Secure access service edge / SASE
Crawl, walk and run with SASE adoption
For organisations that would prefer to pace themselves and take a slower, more systematic approach to SASE adoption, a strategy of ‘crawl, walk, run’ is recommended, writes Bitglass regional sales director for ANZ Wayne Neich.
Story image
Ransomware
How to achieve ransomware resilience in three steps
All organisations need advanced threat protection to stop ransomware attacks and ease the impact if they do occur, writes Bitglass CTO Anurag Kahol.
Story image
Privacy
Why consumer privacy is crucial in a remote work era
Organisations should monitor all file, app, user and web activity with comprehensive activity logs to uncover the whereabouts of consumers’ data.
Story image
Cybersecurity
How to stay ahead of the next cyber breach
With so many people working from home, the corresponding surge in app usage, unmanaged devices, web traffic and accessing internal resources is making security a much trickier prospect.
Story image
Cloud Security
Bitglass kicks off new year with two senior APJ hires
“I look forward to helping Bitglass change the way people and organisations protect themselves when using the cloud."
Story image
VPN
SASE vs zero trust – or the best of both worlds
Zero trust and SASE work together by converging a least-privilege access strategy with an architecture that simplifies how highly distributed users, BYOD, and cloud resources are secured.
Story image
Cloud Security
Data leakage concerns dominate cloud security perceptions - Bitglass report
How secure is the public cloud? That’s what many IT and security professionals are asking as data leakage becomes a pressing concern for organisations and their data protection strategies.
Story image
Cybersecurity
How a vantage point sees threats before they impact
When the focus has been on adversaries that develop increasingly complex and sophisticated attacks, tried and true techniques such as compromised credentials continue to be amongst the most potent weapons.
Story image
Cybersecurity
Video: 10 Minute IT Jams - Bitglass director on all things SASE
This is our second IT Jam with both Bitglass and Jonathan Andresen, who is the company's senior director of marketing.
Story image
Secure access service edge / SASE
SASE: The new wave of securing the enterprise
Legacy network security solutions built around on-premises architectures cannot support the evolving demands placed on IT, writes Bitglass CTO Anurag Kahol.
Story image
Cybersecurity
Insider threat report reveals deception in the workforce
Insider threats come from people inside an enterprise, whether they divulge proprietary information with nefarious intentions, or are just careless employees that unwittingly share sensitive data, writes Bitglass product marketing manager Juan Lugo.
Story image
Cybersecurity
Video: 10 Minute IT Jams - Who is Bitglass?
Today, Techday speaks to Bitglass senior director of marketing Jonathan Andresen, who discusses insider attacks and the best solutions and practices to employ to protect organisations and employees.
Story image
CASB
The SASE triangle: How a CASB protects managed apps
Enterprises that fail to adapt to the modern business world when it comes to security are likely to fall prey to data breaches and experience a host of other problems, writes Bitglass product marketing manager Will Houcheime.
Story image
Cybersecurity
Average cost of insider attack $2 million - Bitglass
A report has found 61% of companies had an insider attack in past year.
Story image
Cybersecurity
Research: 61% of companies have suffered an insider attack in last 12 months
It comes as rapid migration to cloud and remote working and BYOD scenarios leave organisations increasingly vulnerable to insider attacks as a result of the upheaval caused by the COVID-19 pandemic.
Story image
Cybersecurity
Bitglass receives US patent for SAML technology
Bitglass designed its SAML relay to allow a cloud access security broker (CASB) to be inserted into the traffic flow between users and cloud services during the login process.
Story image
Cybersecurity
Mind the gap: Why securing the remote workforce is a peak priority
41% of businesses are yet to implement any steps to expand secure access of their remote workforces despite over 75% of employees now working from home.
Story image
Data Loss Prevention / DLP
Why enabling a remote workforce requires converging security at the edge
Data loss prevention (DLP) capabilities within a CASB solution have emerged as the most effective platform to prevent legitimate remote users from accidentally or maliciously sharing business data that could put an organisation at risk.
Story image
BYOD / Bring Your Own Device
BYOD security in remote work era still riddled with issues
Bitglass’ 2020 BYOD Report suggests that BYOD and personal device security in organisations still leave much to be desired, even as more organisations adopt flexible BYOD arrangements.