The Rise of Insider Threats in Verizon’s DBIR

Each year, Verizon releases its Data Breach Investigation Report (DBIR). These reports evaluate the state of security each year, providing detailed statistics around leading vulnerabilities, which industries face the most breaches, and much more. In 2… Continue reading The Rise of Insider Threats in Verizon’s DBIR

Glass Class: Cloud Security Priorities 2020

 
In 2020, organizations must focus on improving their cloud security posture in order to protect corporate data. There are many opportunities for employee missteps causing inadvertent or even malicious exposure. Additionally, without safeguards, … Continue reading Glass Class: Cloud Security Priorities 2020

Glass Class: Securing G Suite

 
G Suite is a set of cloud based productivity tools developed by Google. The Suite of products is comprised of Gmail, Calendar, Docs, Sheets, Slides, and more. These collaborative tools generally increase productivity and efficiency across organi… Continue reading Glass Class: Securing G Suite

Glass Class: Why Integration Matters for Cloud Security

 
Integrated cloud apps are becoming vital to the way people are working in this day and age. We adopt new cloud applications quickly and don’t often think about the risk associated with sharing the data. Cloud integration increases producti… Continue reading Glass Class: Why Integration Matters for Cloud Security

Securing Data Beyond The Corporate Walls

Despite the massive international push for cloud adoption, a distressing number of corporations have not deployed the proper means to securing critical data. Traditional firewalls may have sufficed in the traditional on-prem setting, but with business… Continue reading Securing Data Beyond The Corporate Walls

Glass Class: Where to Detect Malware

 
Many organizations fall to data breaches caused by malware. Malware can and will infect sensitive data uploaded to the cloud unless specific security measures are taken to prevent the spread of malware. With most organizations migrating to the c… Continue reading Glass Class: Where to Detect Malware

Glass Class: Integrating CASB with DLP

 
Most organizations withhold extremely sensitive data, and to prevent that information from leaking externally, they have turned to data loss prevention (DLP) tools. In the past, these organizations would apply DLP tools to their on-premises stor… Continue reading Glass Class: Integrating CASB with DLP

The Four Pillars of CASB: Visibility

Due to the overwhelming amount of data exfiltration, auxiliary CASBs (cloud access security brokers) primarily focus on shadow IT discovery. While blocking unsanctioned apps sounds like the right approach, employees not having some of the tools they’r… Continue reading The Four Pillars of CASB: Visibility

Glass Class: How to Detect Malware

 
Malware can be a serious threat to organizations that don’t have the proper security tools to protect against it. Some forms of malware can force enterprises to… Continue reading Glass Class: How to Detect Malware

The Four Pillars of CASB: Identity

With cloud being so prevalent, it is inefficient for organizations to not consolidate the existing identity and authentication systems used for internal applications. Consequently, employees will no longer need to memorize multiple passwords for the p… Continue reading The Four Pillars of CASB: Identity