Other CTO

  • Cloud Security Tools: Selecting the Right Solutions and the Right Vendors

    Cloud Security Tools: Selecting the Right Solutions and the Right Vendors

    According to IDG’s 2018 Cloud Computing Survey, 89% of companies use Software as a Service (SaaS). With the use of cloud computing increasing every year, challenges have arisen that are unique to...

    Read
  • Insider Threat Mitigation: 5 Best Practices from Cybersecurity Experts

    Insider Threat Mitigation: 5 Best Practices from Cybersecurity Experts

    Cybersecurity experts Jeffrey DiMuro, Salesforce’s Chief Security and Compliance Architect for Financial Service Industry Team, and Josh Hofer, Stearns Bank’s Chief Risk and Information Security...

    Read
  • You Just Bought Shield: Now What? A Salesforce Shield Implementation Guide for Admins

    You Just Bought Shield: Now What? A Salesforce Shield Implementation Guide for Admins

    Now that you’ve chosen Salesforce Shield – a set of point-and-click tools for maximizing your Salesforce security, meeting regulatory compliance, improving CRM usage and adoption, and safeguarding...

    Read
  • ×

    All the Latest Cloud Security and Privacy News, in Your Inbox

    First Name
    Last Name
    Company Name
    Thank you!
    Error - something went wrong!
  • Monthly Cloud Security Roundup: The Top Cybersecurity Threat to the U.S. and More

    Monthly Cloud Security Roundup: The Top Cybersecurity Threat to the U.S. and More

    Each month, we’ll bring you some of the most compelling cloud and Salesforce security-related stories from the last four weeks. In this post, we discuss Facebook’s exposed passwords and more.

    Read
  • Canadian Data Privacy Laws, Security Frameworks, and Cloud Compliance

    Canadian Data Privacy Laws, Security Frameworks, and Cloud Compliance

    In an increasingly digital world, personal information is becoming harder to protect. In response, many countries have developed and enacted privacy laws to strike a balance between information...

    Read
  • 4 More Salesforce Event Monitoring Myths: Understanding What Event Monitoring Does (and Doesn’t) Do

    4 More Salesforce Event Monitoring Myths: Understanding What Event Monitoring Does (and Doesn’t) Do

    One of the biggest challenges customers face when they want to leverage and maximize the value of Salesforce Shield’s Event Monitoring is understanding the basic controls. In order to use the...

    Read
  • Build or Buy Cloud Security: 5 Key Insights for Choosing a Solution from Salesforce and PURE Insurance Tech Leaders

    Build or Buy Cloud Security: 5 Key Insights for Choosing a Solution from Salesforce and PURE Insurance Tech Leaders

    In order to build trust and meet compliance standards, it’s essential for financial services firms to protect and secure sensitive data. But it’s not always simple to implement a security...

    Read
  • California Consumer Privacy Act of 2018: Everything You Need to Know About the New California Data Protection Law

    California Consumer Privacy Act of 2018: Everything You Need to Know About the New California Data Protection Law

    The California Consumer Privacy Act of 2018 (CaCPA) seemed to appear out of nowhere as it passed the desk of Gov. Jerry Brown. Since we’d be hard pressed to find a business that doesn’t somehow...

    Read
  • 3 Salesforce Event Monitoring Facts and Misconceptions: Understanding What it Does (and Doesn’t) Do

    3 Salesforce Event Monitoring Facts and Misconceptions: Understanding What it Does (and Doesn’t) Do

    A key component of the Salesforce Shield security suite, Event Monitoring allows organizations to boost data security and improve forensic investigations within their Salesforce orgs. Thousands of...

    Read
  • Build vs. Buy Cloud Security Software: 4 Must-Ask Questions During the Decision-Making Process

    Build vs. Buy Cloud Security Software: 4 Must-Ask Questions During the Decision-Making Process

    Balancing an organization’s immediate needs while considering long-term growth can be challenging, especially when deciding whether to build vs. buy cloud security software. Cloud solutions can...

    Read
  • 2018 Year in Review: Readers’ 10 Favorite Cloud Security Blog Posts

    2018 Year in Review: Readers’ 10 Favorite Cloud Security Blog Posts

    GDPR, data breaches, a surprise California data privacy law, social engineering, and more: 2018 was a year of growing awareness of cloud data security threats, privacy considerations, and the...

    Read
  • 4 Things You Can Quickly Learn From Monitoring Salesforce Data Exports

    4 Things You Can Quickly Learn From Monitoring Salesforce Data Exports

    By monitoring Salesforce data exports and reports run, you can quickly learn a great deal about how users are interacting with Salesforce -- and use those insights to strengthen your security and...

    Read
  • Hidden Risk for CIOs: A Guide to Managing Shadow IT Security

    Hidden Risk for CIOs: A Guide to Managing Shadow IT Security

    Shadow IT is rampant in many organizations, representing as much as 50 percent of a company's technology spending, on average. And it can have a number of consequences for a business. First and...

    Read
  • The Top 13 Signs Your Employee Is About to Quit

    The Top 13 Signs Your Employee Is About to Quit

    Departing employees can create a lot of challenges for an organization. First and foremost is the loss of knowledge and the extra burden placed on remaining staff as you search for a replacement....

    Read
  • Complying with Privileged User Regulations: How One Firm Met GDPR, ISO 27001 in Salesforce

    Complying with Privileged User Regulations: How One Firm Met GDPR, ISO 27001 in Salesforce

    Securing personal data is at the core of the EU's General Data Protection Regulation (GDPR). Cloud applications, and Salesforce in particular, are rife with personal data. And while Articles 25...

    Read
  • What to Monitor in the Cloud: 2018 Cloud Visibility Report Reveals Blueprint to Success

    What to Monitor in the Cloud: 2018 Cloud Visibility Report Reveals Blueprint to Success

    Cloud spending is forecasted to reach $160 billion in 2018 – a 23.2 percent increase over 2017. Businesses around the globe are capturing the benefits of cloud technology to meet consumer demand...

    Read
  • API Security: Tips for Protecting Your Salesforce Data from API Breaches

    API Security: Tips for Protecting Your Salesforce Data from API Breaches

    APIs are everywhere. They allow applications to communicate with one another, trading essential information that enriches user or customer experience and helps you extend your investment in...

    Read
  • Privileged Users in Salesforce: What Can They Access?

    Privileged Users in Salesforce: What Can They Access?

    Privileged user abuse may be malicious, or it may be unintentional. Either way, it represents a huge liability to your company. The two main areas of concern with privileged user abuse in...

    Read
  • Cloud Leaders Reveal Their Top Cloud Security Priorities, Compliance Focus

    Cloud Leaders Reveal Their Top Cloud Security Priorities, Compliance Focus

    According to Intel Security, 49 percent of cloud security professionals have slowed cloud adoption due to a lack of cybersecurity skills. Perhaps more alarmingly, 36 percent say they’ve identified...

    Read
  • Privileged Users In Your Cloud Applications: Who Are They?

    Privileged Users In Your Cloud Applications: Who Are They?

    Privileged users of Salesforce, Office 365, and other mission-critical cloud applications are necessary to every organization. These are members of your organization who have more advanced...

    Read
  • loading
    Loading More...