K-12 Campus Safety Management and Cloud Security
|

Layering your K-12 campus safety management and cybersecurity tools provides the most complete coverage School administrators have a heavy burden when it comes to keeping students and faculty safe in today’s education environments. Threats to health and safety come in many forms, including cyber threats as well as physical ones. We mainly deal with K-12 […]

Higher Education Cloud Security Is The Most Critical Topic of 2019
|

As more colleges and universities transition to the cloud, higher education cloud security can no longer be treated as an elective As they say, “the writing is on the wall” for the eventual transition to cloud computing in higher education. Like many organizations, colleges and universities are moving to the cloud to reduce the costs […]

K-12 Cloud Application Security Provides Critical Visibility and Control
|

Learn why schools across the country are using dedicated K-12 cloud application security technology to protect students and staff

3 Critical K-12 Cloud Security Categories—Are Your Students At Risk?
|

Learn How School IT Administrators Protect Students and Staff with K-12 Cloud Security

3 Reasons Your School Needs K-12 Cloud Security Solutions
|

K-12 cloud security solutions protect students and staff from identity theft, financial risk and personal harm

Add Cloud Security to Your School Supply List
|

Remember the excitement of heading back to school? Spending hours organizing your pencil box and binder until you got it just right? Fresh notebooks ready to be filled with notes and doodles? For today’s student, the same excitement is there (most of the time hopefully), but the tools have changed.

2018: The CASB Year Ahead
|

As cloud apps and CASBs have matured, predicting 2018 industry events is much easier than in the past. You don’t need to be a psychic to know that there will be at least one CASB vendor acquired by a big security company. Of course, there will be nuances and details that are hard to pin down, but for the most part, the road ahead is getting clearer. Acquisitions, product changes, and our day to day work provide hints at what’s coming next.

2017: Looking Back at the Year in the CASB Market
|

As we roll into 2018, we expect 2017 will be remembered with mixed emotions. Instead of debating its merits and drawbacks, most will agree that 2017 was a time of rapid change, especially for cloud security technology. Stories about digital security are mainstream news. And we are proud to say that the Cloud Access Security Broker (CASB) industry has also become mainstream, to the point that consolidations have shrunk the standalone space, and CASBs play an important role in most major security stacks.

Cyber Security in Higher Ed: How to Avoid Becoming the Next Target
|

Higher education institutions are major targets for hackers. Their databases contain a perfect trifecta of personal information, financial and health data for what’s considered high-value targets on the black market. Last year, a hacker known as Rasputin breached over 60 universities and government agencies and the tally continued to grow into 2017, becoming one of the largest higher education breaches in history.

CASB Machine Learning: Easy to Say, Hard to Train
|

Lately, it’s become popular to say that CASB tools use Machine Learning (ML) to detect anomalies in cloud apps. However, you have to be cautious about these claims. What is not widely known is that building a machine learning model is the easy part; training the model is the hard part, requiring enormous amounts of data.

Why the Architecture of Your CASB Matters
|

In the past, security technologies were black boxes that you placed in your data center.  For the most part, customers didn’t look inside the security technology. Those black boxes worked well in a defined perimeter. Things started changing with virtualization. You can now get a powerful security VM stood up in minutes. 

Cloud Email: the obvious next step in cloud security
|

Email is almost too easy. We barely give it a second thought before hitting send or clicking open. According to a 2014 study published by the Radicati Group, people check their email an average of 74 times a day to receive about 88 emails and send about 34 emails, and that was 3 years ago! If we spent a lot of time thinking about every single email we receive and send, we’d spend our entire workday in our inboxes.

Cloud Security has Crossed the Pond
|

We’re excited to announce that UK companies can now have visibility and control of their cloud applications thanks to our first reseller partners in the UK: Prevention Software and Cyber Secure. These partners are now offering our CASB product, Cloud Access Monitor.

Schools are Teetering on a Cybersecurity Seesaw
|

Schools need accessible data and networks for a diverse audience of users, including students, parents, teachers, administrators, and third-party vendors. And on the surface, it seems that the cloud is making meeting everyone’s needs much easier. Yet the transition to cloud-based computing was oversold as a much less expensive way to manage IT, but the truth is that you still have to manage your school’s IT services and cybersecurity even when they are in the cloud. It’s a delicate balancing act.

Schools Using Google Need a Lesson in Cloud Security
|

I used Google Docs to write this post – the popular word processing app within Google G Suite. At ManagedMethods, Docs is an indispensable part of our workflow. Collaborating, sharing and editing documents with a team through the cloud is easier than ever, leaving many of Microsoft’s Office apps in the dust.

Attention: IT has Moved to the Cloud. Why Hasn’t Security?
|

IT has moved out of the enterprise data center and into the cloud. Employees work from anywhere and access business data using personal devices such as tablets, phones, and laptops as BYOD is becoming more widely adopted. While the technology to support this new way to work has evolved, security protocols haven’t kept up and legacy network security vendors are scrambling to find an answer to this increasing trend.

Yesterday’s Google Docs Phishing Scheme: OAuth as an Attack Vector
|

OAuth is a very good security standard that has been carefully designed to balance user experience and security and is a solid security protocol that has been used across many apps. OAuth is a standard many SaaS vendors support for REST API access. When something is as popular as OAuth, it quickly becomes an attractive target for hackers and bad guys, like with yesterday’s Google Docs attack.

Uber and Unroll.me: How They Secretly Collected Data
|

A recent New York Times article about Uber shared some damaging revelations about the company’s CEO, Travis Kalanick, and how Uber leveraged data from an app called Unroll.me

Accidents in the Cloud: Better Buckle Up
|

Last week, Ars Technica broke news about an information leak in Docs.com, Microsoft’s version of Google G Suite. Users unwittingly shared sensitive docs publicly that contained private data easily accessible from search engines. Microsoft is taking corrective action, but for those who’ve had their Social Security and health information hijacked, these actions are of little consolation.

The Hidden Benefits of Shadow IT
|

Security is a balancing act. If you aren’t secure enough, risks proliferate. And if you are too secure, risks will still proliferate because users will find ways around it.

See More