Companies are shifting to Cloud Application Security Platforms (CASP) to improve speed without sacrificing security I am fascinated with terms industry analysts introduce to the market. Oftentimes, these terms confuse the market more than they help. The risk is that these terms become outdated even before an analyst publishes their paper. It then takes an […]
As cloud apps and CASBs have matured, predicting 2018 industry events is much easier than in the past. You don’t need to be a psychic to know that there will be at least one CASB vendor acquired by a big security company. Of course, there will be nuances and details that are hard to pin down, but for the most part, the road ahead is getting clearer. Acquisitions, product changes, and our day to day work provide hints at what’s coming next.
As we roll into 2018, we expect 2017 will be remembered with mixed emotions. Instead of debating its merits and drawbacks, most will agree that 2017 was a time of rapid change, especially for cloud security technology. Stories about digital security are mainstream news. And we are proud to say that the Cloud Access Security Broker (CASB) industry has also become mainstream, to the point that consolidations have shrunk the standalone space, and CASBs play an important role in most major security stacks.
Lately, it’s become popular to say that CASB tools use Machine Learning (ML) to detect anomalies in cloud apps. However, you have to be cautious about these claims. What is not widely known is that building a machine learning model is the easy part; training the model is the hard part, requiring enormous amounts of data.
In the past, security technologies were black boxes that you placed in your data center. For the most part, customers didn’t look inside the security technology. Those black boxes worked well in a defined perimeter. Things started changing with virtualization. You can now get a powerful security VM stood up in minutes.
Last week, Ars Technica broke news about an information leak in Docs.com, Microsoft’s version of Google G Suite. Users unwittingly shared sensitive docs publicly that contained private data easily accessible from search engines. Microsoft is taking corrective action, but for those who’ve had their Social Security and health information hijacked, these actions are of little consolation.
Technology has undergone a seismic shift due to cloud app use. Businesses have gained efficiency, while at the same time tech pros have gained a few more headaches from new security risks. Activity outside of a network admin’s grasp is growing faster than ever predicted.
RSA is one of the more enlightening and overwhelming security events that we participate in annually. There is an air of maturity in the industry. Increased attention and size over the last year has imparted a sense of responsibility along with a humble appreciation that no single product is a silver bullet.