Blog

/Blog/

Risk in Cloud Computing Infrastructure: IaaS Research Study

Data breaches in the cloud don’t look like the on-premises breaches we’re used to, where malware infiltrates the network and reaches endpoint devices, siphoning out data to a command and control location. In the cloud, primarily within Infrastructure-as-a-Service (IaaS) environments, data theft often occurs using native functions of the cloud which are built and delivered [...]

September 24th, 2019|Uncategorized|0 Comments

Detecting and Preventing Insider Threats in the Cloud

As cloud use in the enterprise has evolved, so have cloud security priorities. Organizations are less worried about unauthorized consumer cloud applications and are more concerned about the security of sensitive data in strategic enterprise cloud services. Cybersecurity incidents involving sensitive data in the cloud can be less frequent, but more damaging. The number of [...]

September 18th, 2019|Uncategorized|0 Comments

5 Key Findings from 2019 Cloud Adoption and Risk Report

Cloud services are now a vital part of corporate life, bringing a momentous opportunity to accelerate business through their ability to quickly scale, allowing us to be agile with our resources, and providing new opportunities for collaboration. The typical organization uses, on average, 1,935 cloud services spanning enterprise-ready services procured by the IT department such [...]

August 26th, 2019|Uncategorized|0 Comments

The Top 5 G Suite Security Use Cases for Third Party Apps

G Suite, the collection of business collaboration tools from Google has been growing in adoption over the past decade, reaching over 5 million business customers who use tools like Gmail, Google Drive, and Google Docs to work more efficiently. Firms like ATB Financial have reimagined the way they work by using Google Docs as a [...]

August 15th, 2019|Uncategorized|0 Comments

Why Security Teams Have Come to Embrace the Cloud

Business users are not the only ones within enterprises to benefit from the use of cloud services. A majority of security teams say that they can achieve better security within cloud environments, according to new research from McAfee. The latest Cloud Adoption and Risk Report from McAfee focuses on the business growth organizations achieve through [...]

July 28th, 2019|Uncategorized|0 Comments

3 Ways to Secure Enterprise Shadow IT

Do You Know What’s Lurking in the Shadows Have you ever used that instant PDF converting service or that random cloud application to share a large file, when in a bind? Well you’re not alone! In the interest of getting things done, employees often use cloud applications not approved by IT. These applications, commonly referred [...]

June 24th, 2019|Uncategorized|0 Comments

The Cloud Security Use Cases that Put Enterprise Data at Risk

Enterprises around the world are adopting the cloud at an increasing pace to provide their employees with services that increase productivity and their customers with new digital experiences that drive business growth. In the process, sensitive enterprise data is increasingly created, stored, and shared in the cloud and it is therefore exposed to new threats [...]

June 2nd, 2019|Uncategorized|0 Comments

General Data Protection Regulation (GDPR) – One Year Later

Since May 25, 2018, on which GDPR became enforceable, in the 28 countries of the European Union (EU), the GDPR has set up significant new standards for privacy all over the world.  So, what has happened this past year? I’d say that privacy has come of age – from an area that was not a [...]

May 22nd, 2019|Uncategorized|0 Comments

Three Ways to Integrate Active Directory with Your Saas Applications

The tendency of SaaS applications to be siloed has made identity management, user access and authorization an increasing challenge. The task of onboarding users is a time-intensive, manual process that involves administrators across multiple departments, which can introduce risk. Additionally, in most enterprises, Microsoft Active Directory (AD) is the authoritative user directory that governs access to [...]

May 5th, 2019|Uncategorized|0 Comments