Stories by Anurag Kahol
Warning: Pay heed to Data Protection Day
Data Protection Day, impending in Europe, serves as a global reminder of the importance of keeping sensitive data secure.
Is BYOD the final mile to Digital Transformation success?
The concept of bring your own device (BYOD) has skyrocketed in popularity as remote and hybrid working becomes the norm. However, security concerns remain.
What is identity and access management and why is it so important?
The importance of protecting digital identities in the face of increasing online fraud and breaches of personal data.
Why IT needs smarter cloud security in the age of the hybrid workplace
IT and security professionals face increasing complexity and threats. Smarter security solutions and automation can help ease the burden.
Why IT needs smarter cloud security
IT and security professionals face growing complexity as remote work and cloud services become the norm, making smarter security solutions crucial.
How to focus cloud-centric organisations’ data protection
Organisations can embrace digital transformation with confidence by including these crucial considerations in data protection strategy planning and execution.
True cloud security really should be delivered from the cloud
The impact of downtime on cloud security solutions is causing concern as SASE vendors experience significant outages.
How should cloud-centric organisations prioritise data protection?
Organisations can embrace digital transformation with confidence by including these critical considerations in data protection strategy planning and execution.
Best practices and key factors for identity management
In parallel with any physical form of identification, digital identities must be protected at all costs to prevent identity theft or fraud.
How to achieve ransomware resilience in three steps
All organisations need advanced threat protection to stop ransomware attacks and ease the impact if they do occur, writes Bitglass CTO Anurag Kahol.
Why consumer privacy is crucial in a remote work era
Organisations should monitor all file, app, user and web activity with comprehensive activity logs to uncover the whereabouts of consumers’ data.
How to stay ahead of the next cyber breach
The shift to remote working has posed challenges for cybersecurity professionals. This article explores how to adapt to the new security landscape.
SASE: The new wave of securing the enterprise
Legacy network security solutions built around on-premises architectures cannot support the evolving demands placed on IT, writes Bitglass CTO Anurag Kahol.
Why zero trust remote networking is key to thriving in the ‘new normal’ business world
The shift to remote working has highlighted the need for secure infrastructure. Zero trust remote work can provide the solution.
Why it’s essential to re-write IT security for the cloud era
Cloud era shifts IT focus: Workforce mobility reshapes security strategies, perimeters redefine as digital transformation takes command.
Mind the gap: Why securing the remote workforce is a peak priority
41% of businesses are yet to implement any steps to expand secure access of their remote workforces despite over 75% of employees now working from home.
It’s time for firms' cybersecurity credentials to take centre stage
Fortune 500's data security in question: Study reveals lax corporate attention to customer privacy.
Cloud adoption trends: SSO adoption lagging
Research found that only 34% of those who had adopted cloud-based solutions had implemented single sign-on (SSO), one of the most basic cloud security tools.
The BYOD juggling act: balancing security, privacy and mobility
The productivity benefits of enabling cloud and mobile mean most organisations offer BYOD. But it's a headache for IT teams. Is there a balance?.
How to achieve secure, flexible and scalable IaaS - Bitglass
While using IaaS brings many advantages, it also raises unique data leakage concerns that must be addressed in order to maintain robust cybersecurity.
Five tips to defend against cryptojacking - Bitglass
Hackers mine for crypto via 'cryptojacking', draining devices and cloud resources; firms face soaring costs.
How to avoid becoming a cryptojacking victim - Bitglass
Large-scale cryptojacking is a lucrative business due to the popularity and value of cryptocurrencies like Bitcoin and Ethereum.
How phishing is evolving to outpace awareness
New cloud-based phishing scams evade detection, targeting Gmail and G Suite users with OAuth exploits.