Cloud security

  • Monthly Cloud Security Roundup: The Capital One Data Breach, CCPA’s Influence on US Privacy Laws, and More

    Monthly Cloud Security Roundup: The Capital One Data Breach, CCPA’s Influence on US Privacy Laws, and More

    Each month, we’ll bring you some of the most compelling cloud and Salesforce security-related stories from the last four weeks. In this post, we discuss the Capital One data breach, British...

    Read
  • Cloud Security Tools: Selecting the Right Solutions and the Right Vendors

    Cloud Security Tools: Selecting the Right Solutions and the Right Vendors

    According to IDG’s 2018 Cloud Computing Survey, 89% of companies use Software as a Service (SaaS). With the use of cloud computing increasing every year, challenges have arisen that are unique to...

    Read
  • The 18 areas organizations are monitoring for total cloud visibility

    Download Now
  • ×

    All the Latest Cloud Security and Privacy News, in Your Inbox

    First Name
    Last Name
    Company Name
    Thank you!
    Error - something went wrong!
  • Uncovering the Value of Salesforce Event Monitoring Logs

    Uncovering the Value of Salesforce Event Monitoring Logs

    Have you ever wanted to know what your Salesforce users are clicking on? Have you ever needed to know what files your employees are downloading? Normally, uncovering this information is...

    Read
  • Insider Threat Mitigation: 5 Best Practices from Cybersecurity Experts

    Insider Threat Mitigation: 5 Best Practices from Cybersecurity Experts

    Cybersecurity experts Jeffrey DiMuro, Salesforce’s Chief Security and Compliance Architect for Financial Service Industry Team, and Josh Hofer, Stearns Bank’s Chief Risk and Information Security...

    Read
  • Learn How to Monitor Salesforce User Activity in Real Time

    Watch Now
  • New Cybercrime-Fighting Unit to Enforce New York Cybersecurity Regulations for Financial Institutions

    New Cybercrime-Fighting Unit to Enforce New York Cybersecurity Regulations for Financial Institutions

    The Wall Street Journal recently reported that a newly-founded crime-fighting cyber unit will begin enforcing security rules laid forth by New York cybersecurity regulations. The primary role of...

    Read
  • Are Insider Threats Lurking in Your Financial Organization? How to Identify and Mitigate Risks in Salesforce and Beyond46:24

    Are Insider Threats Lurking in Your Financial Organization? How to Identify and Mitigate Risks in Salesforce and Beyond

    Are insider threats lurking in your financial organization? You might be surprised. This webinar will show you how to identify and mitigate risks in Salesforce and beyond.

    Watch
  • Real-Time Event Monitoring: What’s New in Salesforce’s Summer 2019 Product Release

    Real-Time Event Monitoring: What’s New in Salesforce’s Summer 2019 Product Release

    Eagerly anticipated by Salesforce users every season, the newest product release for 2019 brings exciting updates for Salesforce’s Event Monitoring tool. Primarily used to gain visibility in...

    Read
  • Monthly Cloud Security Roundup: The Debut of Salesforce Blockchain, Equifax’s $1.4B Breach Costs, and More

    Monthly Cloud Security Roundup: The Debut of Salesforce Blockchain, Equifax’s $1.4B Breach Costs, and More

    Each month, we’ll bring you a few of the most compelling cloud and Salesforce security-related stories from the last four weeks. In this post, we discuss the debut of Salesforce Blockchain, zero...

    Read
  • Managing the Privileged User Threat: Best Practices for Salesforce

    Read the Guide
  • You Just Bought Shield: Now What? A Salesforce Shield Implementation Guide for Admins

    You Just Bought Shield: Now What? A Salesforce Shield Implementation Guide for Admins

    Now that you’ve chosen Salesforce Shield – a set of point-and-click tools for maximizing your Salesforce security, meeting regulatory compliance, improving CRM usage and adoption, and safeguarding...

    Read
  • Cloud Computing in Healthcare – What are the Benefits and Challenges?

    Cloud Computing in Healthcare – What are the Benefits and Challenges?

    From cutting costs to increasing efficiency, leveraging the cloud drives healthcare to integrate innovative technology to improve patient care. By implementing software like Office 365 and...

    Read
  • 5 Questions Banks Should Ask When Evaluating Cloud-Based Security Solutions

    5 Questions Banks Should Ask When Evaluating Cloud-Based Security Solutions

    When banks move to the cloud, the top challenges are a) security and b) regulatory compliance. Evaluating cloud-based security solutions for financial institutions is something that calls for...

    Read
  • What is Einstein Analytics? A Closer Look at Salesforce’s Visibility Tool

    What is Einstein Analytics? A Closer Look at Salesforce’s Visibility Tool

    In June 2017, the world’s #1 CRM platform, Salesforce, released their newly rebranded analytics tools for viewing data – Einstein Analytics (formerly known as “Wave”). Many who use the platform...

    Read
  • 5 Types of Insider Threats in Financial Organizations – and How to Mitigate Them

    5 Types of Insider Threats in Financial Organizations – and How to Mitigate Them

    Cybersecurity threats are a continuous concern for financial organizations – in fact, financial service firms face 300 times more security incidents than other industries.

    Read
  • Should You Build or Buy a Salesforce Data Protection Solution?

    Find Out Now
  • 7 Insights from Cisco’s 2019 CISO Benchmark Study

    7 Insights from Cisco’s 2019 CISO Benchmark Study

    To help CISOs better anticipate the challenges they face in their role, Cisco released a new chapter in its Cybersecurity Series – the 2019 CISO Benchmark Study.

    Read
  • Monthly Cloud Security Roundup: The Top Cybersecurity Threat to the U.S. and More

    Monthly Cloud Security Roundup: The Top Cybersecurity Threat to the U.S. and More

    Each month, we’ll bring you some of the most compelling cloud and Salesforce security-related stories from the last four weeks. In this post, we discuss Facebook’s exposed passwords and more.

    Read
  • The 6 Elements Every Financial Institution Needs for Defense-in-Depth Security

    The 6 Elements Every Financial Institution Needs for Defense-in-Depth Security

    In the same way that medieval castles were designed with multiple security layers for protection, today’s organizations require a multifaceted approach to safeguarding highly sensitive data....

    Read
  • The Admin’s Guide to Salesforce Visibility: Using Event Monitoring to Boost ROI, Productivity

    The Admin’s Guide to Salesforce Visibility: Using Event Monitoring to Boost ROI, Productivity

    Salesforce has quickly become a mission-critical application for organizations of all types. The great news for admins is that Salesforce visibility can show you not only how users are adopting...

    Read
  • Build vs. Buy Cloud Security Software: 4 Must-Ask Questions During the Decision-Making Process

    Build vs. Buy Cloud Security Software: 4 Must-Ask Questions During the Decision-Making Process

    Choosing a cloud security isn't always a straightforward process. Some companies want to build a custom solution; others prefer to buy one off the sheld. Which is right for you?

    Read
  • 4 More Salesforce Event Monitoring Myths: Understanding What Event Monitoring Does (and Doesn’t) Do

    4 More Salesforce Event Monitoring Myths: Understanding What Event Monitoring Does (and Doesn’t) Do

    One of the biggest challenges customers face when they want to leverage and maximize the value of Salesforce Shield’s Event Monitoring is understanding the basic controls. In order to use the...

    Read
  • Salesforce Data Protection through User Activity Monitoring

    Salesforce Data Protection through User Activity Monitoring

    In order to expand enterprise trust in Salesforce, data protection strategies that include user activity monitoring should be planned and implemented. How can you expand your reputation for trust?

    Read
  • loading
    Loading More...