September 8, 2016 Point-of-Sale Data Breach Goes to the Cloud 2 min read - During a recent point-of-sale data breach, attackers made off with client data regarding products, sales, passwords and electronic signatures.
Cloud Security August 31, 2016 Out With the Old, in With the New: Are You Ready to Move to IDaaS? 4 min read - A move to IDaaS requires skill, knowledge and a small leap of faith, but the increased control over the cloud environment is well worth the elbow grease.
Cloud Security August 25, 2016 Three Overlooked Benefits of a CASB 2 min read - A CASB is helpful for harnessing shadow IT cloud applications, but it can also offer three additional benefits that companies often overlook.
August 22, 2016 Attitude Adjustment: Cloud Security Risks Losing Steam as Top Worry 2 min read - Companies are still worried about cloud security risks, but many are more concerned about the resources required to integrate existing infrastructure.
August 18, 2016 Public Cloud Trumps Local Security, Remains Top IT Concern — What Gives? 2 min read - Public cloud services have become more secure than on-premises options. Still, many IT professionals are hesitant to move their data off-site.
Cloud Security August 18, 2016 Can Cloud Security Decrease Breach Containment Costs? 3 min read - Are cloud security tools worth the investment? It depends the type of tools, how they're configured and how they're implemented.
Identity & Access August 18, 2016 The Top Four Reasons CISOs Are Adopting Cloud-Based Solutions for Identity and Access Management 2 min read - As business moves to the cloud, it makes sense for CISOs to manage identity and access management functions with cloud-based solutions.
Cloud Security August 11, 2016 Cloud IAM Scenarios in Retail, Academia and Finance: Three Tips From an IDaaS Expert 2 min read - The demand for IDaaS is expanding into every industry. Retailers, universities and financial institutions can benefit from adopting cloud IAM solutions.
Cloud Security August 3, 2016 Cloud Security Controls: Time to Ensure Added Perimeter Defense for Your Public Cloud Deployments 2 min read - Additional cloud security controls are worth every penny of your investment to ensure perimeter defense for your public cloud deployments.
August 2, 2016 Cloud File Storage Can Be a Shadow Threat 2 min read - The latest edition of the Shadow Data Report found that most cloud file storage apps fail to achieve compliance with SOC 2 and GDPR.