Stories by Anurag Kahol
Warning: Pay heed to Data Protection Day
Data Protection Day, impending in Europe, serves as a global reminder of one of the most important responsibilities for any organisation: keeping sensitive data secure.
Is BYOD the final mile to Digital Transformation success?
The concept of bring your own device (BYOD) has been around for years, but since the shift to more remote and hybrid working around the world, its popularity has reached bold new heights.
What is identity and access management and why is it so important?
Despite many high profile instances of online fraud, it can be easy to become complacent about the dangers. But in today’s world, where everyone has a unique digital identity based on our online presence, the threats are very real.
Why IT needs smarter cloud security in the age of the hybrid workplace
For IT and security professionals, the job is becoming more complex day by day. With widely dispersed teams fast becoming the norm, new technologies emerging, and an ever-increasing level of threats, it's a demanding job that takes a lot to keep up.
Why IT needs smarter cloud security
Organisations are becoming increasingly reliant on cloud-based applications for employees who spend more time working remotely, putting more pressure on security.
How to focus cloud-centric organisations’ data protection
Organisations can embrace digital transformation with confidence by including these crucial considerations in data protection strategy planning and execution.
True cloud security really should be delivered from the cloud
The impact of uptime and performance across cloud security solutions is coming under increased scrutiny.
How should cloud-centric organisations prioritise data protection?
Organisations can embrace digital transformation with confidence by including these critical considerations in data protection strategy planning and execution.
Best practices and key factors for identity management
In parallel with any physical form of identification, digital identities must be protected at all costs to prevent identity theft or fraud.
How to achieve ransomware resilience in three steps
All organisations need advanced threat protection to stop ransomware attacks and ease the impact if they do occur, writes Bitglass CTO Anurag Kahol.
Why consumer privacy is crucial in a remote work era
Organisations should monitor all file, app, user and web activity with comprehensive activity logs to uncover the whereabouts of consumers’ data.
How to stay ahead of the next cyber breach
With so many people working from home, the corresponding surge in app usage, unmanaged devices, web traffic and accessing internal resources is making security a much trickier prospect.
SASE: The new wave of securing the enterprise
Legacy network security solutions built around on-premises architectures cannot support the evolving demands placed on IT, writes Bitglass CTO Anurag Kahol.
Why zero trust remote networking is key to thriving in the ‘new normal’ business world
With so many question marks over the road ahead, enterprises need a solution that enables flexibility to work in any environment, as they try to acclimatise to the ‘new normal', writes Bitglass CTO Anurag Kahol.
Why it’s essential to re-write IT security for the cloud era
Key components of network security architecture for the cloud era should be built from the ground up, as opposed to being bolted on to legacy solutions built for organisations functioning only on-premises or from only managed devices.
Mind the gap: Why securing the remote workforce is a peak priority
41% of businesses are yet to implement any steps to expand secure access of their remote workforces despite over 75% of employees now working from home.
It’s time for firms' cybersecurity credentials to take centre stage
leading enterprise database was also used to identify whether each company had a chief information security officer (CISO) or a chief security officer (CSO). The results proved extremely interesting…
Cloud adoption trends: SSO adoption lagging
Research found that only 34% of those who had adopted cloud-based solutions had implemented single sign-on (SSO), one of the most basic cloud security tools.
The BYOD juggling act: balancing security, privacy and mobility
Left unmanaged, personal devices and unmanaged cloud applications can lead to data loss, but if managed too strictly, the IT team risks a backlash from unhappy employees, Bitglass says.
How to achieve secure, flexible and scalable IaaS - Bitglass
While using IaaS brings many advantages, it also raises unique data leakage concerns that must be addressed in order to maintain robust cybersecurity.
Five tips to defend against cryptojacking - Bitglass
The incidence of cryptojacking has seen rapid growth and has emerged as a favourite strategy for hackers.
How to avoid becoming a cryptojacking victim - Bitglass
Large-scale cryptojacking is a lucrative business due to the popularity and value of cryptocurrencies like Bitcoin and Ethereum.
How phishing is evolving to outpace awareness
While email providers have made strides in flagging suspicious emails and source domains, reducing the effectiveness of attacks, attackers’ techniques have also evolved.