CASB
Shadow IT Risks CISOs Should Know
August 17 by Lisa MorganThe CISO can't protect that which is unknown. Hence the need for asset management and CASB tools that help explain the actual ecosystem. Advisory firm CEB estimates that 40% of all IT spending occurs...
Cloud Security Staples Today's Enterprises Need
April 20 by Lisa MorganOrganizations have been venturing further into the cloud, faster than they anticipated just to deal with the whipsaw effects of the COVID-19 pandemic. In 2020, they discovered cloud was essential for...
A Secure Access Mindset
February 09 by Seth AdlerWhat is said about secure access doesn't always line up with what is done with secure access. The seamless integration of the enterprise must be taken into account when taking steps on the secure acce...
A How To Guide To Secure Access Service Edge (SASE)
November 10 by CSHub.com Editorial StaffUnplanned circumstances underscored the need for zero trust mechanisms at the edge and comprehensive cloud-based security options to protect data, intellectual property, other enterprise assets and re...
Forrester Study: Yesterday’s Solutions Won’t Solve Tomorrow’s Data Security Issues
November 02 by CSHub.com Editorial StaffLearn the top reasons security teams purchase policy-based security tools like DLP and/or CASB, the biggest problems using these tools and what security teams are doing now to address gaps in threat i...
Engaging Zero Trust Architecture
July 27 by Seth AdlerOrganizations with a proponderance of remote workers or a completely mobile workforce are considering switching to either a CASB (if their resources are 100% in the cloud) or a software-defined perime...
Comparing CASB Technologies for Cloud Security: What’s the Difference?
July 15 by Seth AdlerView the Jonathan Andresen, Senior Director Marketing, Bitglass CSHub APAC Summit session on-demand session now.
Cloud Security Market Report: Exploring The Right Enterprise Strategy
July 29 by Jeff OrrThis Cyber Security Hub market report examines the ins and outs of today’s hybrid cloud setups so enterprises can better understand the technology and vulnerabilities, in order to develop the right cl...