Posts

shutterstock_16629199

Data Protection: The Cloud Security Cornerstone

Not Your Grandma’s IT Security Concern Not that long ago,…
Hardware store clerk with keys
,

Does BYOK Mean 'Barely Your Own Keys'?

3 Truths about Encryption and BYOK Many people making important…
thumbnail_LeaveOrRemain1
,

Leave or Remain, GDPR will set the standard for data privacy across Europe and the rest of the world.

“Hello, I must be going, I cannot stay, I came to say, I…
300x300_featured image
cloud security data loss prevention featured image

Cloud Security 101: DLP Blind Spots and How to Fix Them

/
Data loss prevention (DLP) is an integral part of an enterprise's…
CASB---featured-image

How CASBs Mitigate Cloud Computing Disadvantages

For proponents of enterprise cloud computing, it can be hard…
CipherCloud Fun Giveaway

2015 Black Hat – What to Look Forward to at the Event

  Next week is the Black Hat conference again, the annual…
cloud-security-predictions

CipherCloud’s 2015 Cloud Security Predictions

More Sony-like hacks ahead It all started with the Target…
Shadow_IT_Cloud_Data_Protection
,

For Total Cloud Data Protection, Companies Must Gain Control of Shadow IT

Think fast! How much of a problem is shadow IT at your organization? If…
3_reasons_cloud_malware_cloud_security_solutions
,

3 Reasons Why Detecting Cloud Malware Is Essential for Cloud Security Solutions

Key Considerations for Cloud Security Solutions Among all the…
Balancing_Cloud_Security_Cloud_Adoption

Balancing Cloud Application Risk with Adoption

It is generally understood that there is no such thing as a perfect…