Other CTO

  • 8 Takeaways from the 2019 Cost of a Data Breach Report

    8 Takeaways from the 2019 Cost of a Data Breach Report

    Discover eight of the top takeaways from the recent 2019 Cost of a Data Breach Report from IBM and Ponemon Institute in this blog post.

    Read
  • Discover Why Data Privacy Matters to Your Organization

    Watch Now
  • Cloud Data Compliance and Security – Achieving Regulatory Compliance with Cloud Security Applications

    Cloud Data Compliance and Security – Achieving Regulatory Compliance with Cloud Security Applications

    Security and privacy may lead the pack when it comes to cloud usage, but cloud data compliance is an important area that often goes overlooked. Organizations move to cloud-based services to enable...

    Read
  • Unlock the Potential of Salesforce: Expand Trust, Privacy, and Cloud Application Security

    Unlock the Potential of Salesforce: Expand Trust, Privacy, and Cloud Application Security

    Since its initial introduction, the Salesforce application has evolved considerably. What started as an application for cloud-based customer relationship management has gradually become a...

    Read
  • ×

    All the Latest Cloud Security and Privacy News, in Your Inbox

    First Name
    Last Name
    Company Name
    Thank you!
    Error - something went wrong!
  • Aligning Cloud Security and Privacy Tactics to Meet Cloud Compliance

    Aligning Cloud Security and Privacy Tactics to Meet Cloud Compliance

    Organizations in all industries harness the power of the cloud with the help of cloud-based security solutions. With new cybersecurity regulations being passed every year, cloud providers have...

    Read
  • 6 Independent Third-Party Sources for Vetting Cloud Security Vendors

    6 Independent Third-Party Sources for Vetting Cloud Security Vendors

    A top challenge that CISOs face when managing cybersecurity risks is consolidating an overabundance of vendor point solutions. Vetting cloud security vendors is a must for every IT and security team.

    Read
  • Cloud Security Tools: Selecting the Right Solutions and the Right Vendors

    Cloud Security Tools: Selecting the Right Solutions and the Right Vendors

    According to IDG’s 2018 Cloud Computing Survey, 89% of companies use Software as a Service (SaaS). With the use of cloud computing increasing every year, challenges have arisen that are unique to...

    Read
  • Insider Threat Mitigation: 5 Best Practices from Cybersecurity Experts

    Insider Threat Mitigation: 5 Best Practices from Cybersecurity Experts

    Cybersecurity experts Jeffrey DiMuro, Salesforce’s Chief Security and Compliance Architect for Financial Service Industry Team, and Josh Hofer, Stearns Bank’s Chief Risk and Information Security...

    Read
  • You Just Bought Shield: Now What? A Salesforce Shield Implementation Guide for Admins

    You Just Bought Shield: Now What? A Salesforce Shield Implementation Guide for Admins

    Now that you’ve chosen Salesforce Shield – a set of point-and-click tools for maximizing your Salesforce security, meeting regulatory compliance, improving CRM usage and adoption, and safeguarding...

    Read
  • Monthly Cloud Security Roundup: The Top Cybersecurity Threat to the U.S. and More

    Monthly Cloud Security Roundup: The Top Cybersecurity Threat to the U.S. and More

    Each month, we’ll bring you some of the most compelling cloud and Salesforce security-related stories from the last four weeks. In this post, we discuss Facebook’s exposed passwords and more.

    Read
  • Canadian Data Privacy Laws, Security Frameworks, and Cloud Compliance

    Canadian Data Privacy Laws, Security Frameworks, and Cloud Compliance

    In an increasingly digital world, personal information is becoming harder to protect. In response, many countries have developed and enacted privacy laws to strike a balance between information...

    Read
  • 4 More Salesforce Event Monitoring Myths: Understanding What Event Monitoring Does (and Doesn’t) Do

    4 More Salesforce Event Monitoring Myths: Understanding What Event Monitoring Does (and Doesn’t) Do

    To get the most value from Salesforce Event Monitoring, you must know what the tool does and doesn't do. Uncover the myths and facts and obtain more information by reading this post.

    Read
  • Build or Buy Cloud Security: 5 Key Insights for Choosing a Solution from Salesforce and PURE Insurance Tech Leaders

    Build or Buy Cloud Security: 5 Key Insights for Choosing a Solution from Salesforce and PURE Insurance Tech Leaders

    In order to build trust and meet compliance standards, it’s essential for financial services firms to protect and secure sensitive data. But it’s not always simple to implement a security...

    Read
  • California Consumer Privacy Act of 2018: Everything You Need to Know About the New California Data Protection Law

    California Consumer Privacy Act of 2018: Everything You Need to Know About the New California Data Protection Law

    The California Consumer Privacy Act of 2018 (CaCPA) seemed to appear out of nowhere as it passed the desk of Gov. Jerry Brown. Since we’d be hard pressed to find a business that doesn’t somehow...

    Read
  • 3 Salesforce Event Monitoring Facts and Misconceptions: Understanding What it Does (and Doesn’t) Do

    3 Salesforce Event Monitoring Facts and Misconceptions: Understanding What it Does (and Doesn’t) Do

    Salesforce Event Monitoring is the only way to obtain your Salesforce user activity log files...true or false? Explore common myths about Event Monitoring in this eye-opening blog post.

    Read
  • Build vs. Buy Cloud Security Software: 4 Must-Ask Questions During the Decision-Making Process

    Build vs. Buy Cloud Security Software: 4 Must-Ask Questions During the Decision-Making Process

    Balancing an organization’s immediate needs while considering long-term growth can be challenging, especially when deciding whether to build vs. buy cloud security software. Cloud solutions can...

    Read
  • 2018 Year in Review: Readers’ 10 Favorite Cloud Security Blog Posts

    2018 Year in Review: Readers’ 10 Favorite Cloud Security Blog Posts

    The readers have spoken! Explore the top ten favorite cloud security blog posts of 2018 and learn more about industry trends in this roundup blog.

    Read
  • 4 Things You Can Quickly Learn From Monitoring Salesforce Data Exports

    4 Things You Can Quickly Learn From Monitoring Salesforce Data Exports

    What can monitoring Salesforce data exports tell you? For one, the user might be departing your organization soon. Find out other insights you can learn from monitoring in this post.

    Read
  • Hidden Risk for CIOs: A Guide to Managing Shadow IT Security

    Hidden Risk for CIOs: A Guide to Managing Shadow IT Security

    Shadow IT is rampant in many organizations, representing as much as 50 percent of a company's technology spending, on average. And it can have a number of consequences for a business. First and...

    Read
  • The Top 13 Signs Your Employee Is About to Quit

    The Top 13 Signs Your Employee Is About to Quit

    Departing employees can create a lot of challenges for an organization. First and foremost is the loss of knowledge and the extra burden placed on remaining staff as you search for a replacement....

    Read
  • Complying with Privileged User Regulations: How One Firm Met GDPR, ISO 27001 in Salesforce

    Complying with Privileged User Regulations: How One Firm Met GDPR, ISO 27001 in Salesforce

    Securing personal data is at the core of the EU's General Data Protection Regulation (GDPR). Cloud applications, and Salesforce in particular, are rife with personal data. And while Articles 25...

    Read
  • loading
    Loading More...