How to gain visibility with global IT asset inventory

In this podcast recorded at Black Hat USA 2018, Pablo Quiroga, Director of Product Management at Qualys, talks about how to gain unprecedented visibility with global IT asset inventory. Here’s a transcript of the podcast for your convenience. My name i… Continue reading How to gain visibility with global IT asset inventory

Checkmate: How to Win the Cybersecurity Game

Some refer to information security as a war, but it’s better to think of it as a game. To win the cybersecurity game, you need to immerse yourself, practice and retrain regularly.

The post Checkmate: How to Win the Cybersecurity Game appeared first on Security Intelligence.

Continue reading Checkmate: How to Win the Cybersecurity Game

Shadow IT: An Essential Component for Enterprise Security

Last year was infamous for global cybersecurity breaches—so much that it resulted in the game changing for organizational vulnerability. Security today is more than a departmental or team problem, and is very much an organizationwide concern. Shadow I… Continue reading Shadow IT: An Essential Component for Enterprise Security

Three A’s of SaaS adoption, and why every company goes through them

I’ve noticed that as more and more companies turn to SaaS applications to power their business, they all experience the same journey along the way, more or less. Everyone goes through what I call “the 3 A’s of SaaS adoption”: aggravation, acceptance, a… Continue reading Three A’s of SaaS adoption, and why every company goes through them

How to Manage App Security Amid Expanding Shadow IT

Protecting endpoint-generated data is the name of the game in cybersecurity today. However, increasing shares of shadow IT devices in the workplace are making app security a more significant challenge.

The post How to Manage App Security Amid Expanding Shadow IT appeared first on Security Intelligence.

Continue reading How to Manage App Security Amid Expanding Shadow IT

Mitigating Risks of Shadow IT with CASBs

According to the RightScale “2018 State of the Cloud Report,” 81 percent of companies are now using the cloud, an indication that it has more than delivered on its promises of efficiency, convenience and cost optimization. Despite mass ado… Continue reading Mitigating Risks of Shadow IT with CASBs

CASB, what is it? Why do I need it? What has it done for me lately?

The first question most people have when they hear the acronym CASB is, “What the heck is this CASB thing?” According to Gartner, a cloud access security broker (CASB) is an on-premises or cloud-based security policy enforcement point that … Continue reading CASB, what is it? Why do I need it? What has it done for me lately?

The Compliance Crisis: A Compliance Officer Faces an Outdated Risk Management Framework

Follow along with risk and compliance officer Frank Roth as he endeavors to fill in the gaps of an outdated (and incomplete) risk management framework in his new role at a utility company.

The post The Compliance Crisis: A Compliance Officer Faces an Outdated Risk Management Framework appeared first on Security Intelligence.

Continue reading The Compliance Crisis: A Compliance Officer Faces an Outdated Risk Management Framework

£120,000 fine for university after details of 20,000 staff and students exposed in data breach

The University of Greenwich in London has received a fine of £120,000 because of the substantial damage and substantial distress caused by a security breach that exposed the private information of approximately 20,000 people.
Read more in my article on… Continue reading £120,000 fine for university after details of 20,000 staff and students exposed in data breach

Spotlight Your Data Within Shadow IT

A managed cloud access security broker (CASB) can help organizations gain visibility into shadow IT by monitoring all data transferred between the cloud and on-premises infrastructure.

The post Spotlight Your Data Within Shadow IT appeared first on Security Intelligence.

Continue reading Spotlight Your Data Within Shadow IT