SecurityBrief Australia logo
Australia's leading source of cybersecurity and cyber-attack news

Bitglass news stories

Story image
Inventory
Warning: Pay heed to Data Protection Day
Data Protection Day, impending in Europe, serves as a global reminder of one of the most important responsibilities for any organisation: keeping sensitive data secure.
Story image
BYOD / Bring Your Own Device
Is BYOD the final mile to Digital Transformation success?
The concept of bring your own device (BYOD) has been around for years, but since the shift to more remote and hybrid working around the world, its popularity has reached bold new heights.
Story image
Dark web
How to keep data off the Dark Web, even though it’s growing darker
Let's delve deeper into a Dark Web investigation which discusses the rapid growth of Dark Web activity and suggests ways to protect an organisation's data.
Story image
Ransomware
Tech infrastructure diversity holds key to better security
This year, a spate of high profile ransomware incidents has halted operations across business and critical infrastructures alike.
Story image
Cloud
Cybersecurity experts weigh in on GoDaddy data breach
The recent GoDaddy data breach saw the potential exposure of 1.2 million customers' data.
Story image
Identity and Access Management
What is identity and access management and why is it so important?
Despite many high profile instances of online fraud, it can be easy to become complacent about the dangers. But in today’s world, where everyone has a unique digital identity based on our online presence, the threats are very real.
Story image
Bitglass
Why IT needs smarter cloud security in the age of the hybrid workplace
For IT and security professionals, the job is becoming more complex day by day. With widely dispersed teams fast becoming the norm, new technologies emerging, and an ever-increasing level of threats, it's a demanding job that takes a lot to keep up. 
Story image
Microsoft
Tech infrastructure diversity holds key to better security
The spate of high profile ransomware incidents this year has halted operations across business and critical infrastructures alike.
Story image
Ransomware
How businesses unknowingly leave themselves at risk
Recent cyber-events highlight the risks confronting enterprises that depend on a single vendor for their infrastructure, tools, and security.
Story image
Disruption
Forcepoint acquisition of Bitglass to disrupt cybersecurity industry
“Bitglass and Forcepoint share the same vision for disrupting and transforming the security industry with the first modern distributed edge architecture."
Story image
Dark web
Stolen data spreading even faster on the dark web - report
Increased volume of data breaches and more avenues for cybercriminals to monetise data has led to increased activity surrounding stolen data on the dark web.
Story image
Mergers and Acquisitions
Forcepoint acquires Bitglass to bolster Security Service Edge
“The acquisition will go a long way to addressing customers’ security needs across web, cloud, and data centre, particularly as hybrid and remote working environments.”
Story image
Phishing
Why phishing is a bigger threat than ransomware
Preventing today’s increasingly dynamic phishing attempts requires next-generation ‘on-device’ web security that can block phishing sites.
Story image
10 Minute IT Jams
Video: 10 Minute IT Jams - Bitglass director on the evolution of remote working risks
In this interview, we talk to Bitglass senior director of marketing Jonathan Andresen, who is back for his fourth IT Jam.
Story image
Secure access service edge / SASE
What to know when considering zero trust digital transformation
The security landscape is constantly changing, but SASE can help organisations tackle countless security challenges.
Story image
Bitglass
Why IaaS security should be a priority
Why are CIOs and IT organisations prioritising investment in cloud infrastructure? The answer is simple, writes Bitglass senior marketing director Jonathan Andresen.
Story image
Bitglass
Why IT needs smarter cloud security
Organisations are becoming increasingly reliant on cloud-based applications for employees who spend more time working remotely, putting more pressure on security.
Story image
Ransomware
How Microsoft security infrastructure can sink a business
Organisations that are heavily or entirely reliant on Microsoft infrastructure, services and applications can take several steps to shore up their security.
Story image
Cybersecurity
Ignorance is bliss — for hackers
Failure to employ best-of-breed security practices may result in a very uncomfortable talk with CEOs and boards of directors.
Story image
Cloud Security
True cloud security really should be delivered from the cloud
The impact of uptime and performance across cloud security solutions is coming under increased scrutiny.
Story image
BYOD / Bring Your Own Device
Rapid device adoption reveals massive security gaps across BYOD initiatives
Organisations are ill-equipped to deal with growing security threats such as malware and data theft. 
Story image
Cybersecurity
Video: 10 Minute IT Jams - Bitglass director on the relationship between security and digital transformation
Jonathan Andresen, back for his third IT Jam, speaks about how cybersecurity fits into discussions and processes about digital transformation.
Story image
Network Access Control / NAC
Six key characteristics of a modern ZTNA solution
Not all zero trust network access solutions are equal. Organisations should keep in mind these six key characteristics when evaluating ZTNA solutions.
Story image
User experience
How should cloud-centric organisations prioritise data protection?
Organisations can embrace digital transformation with confidence by including these critical considerations in data protection strategy planning and execution.