The 4 Habits of Highly Effective CISOs

The 4 Habits of Highly Effective CISOs

Necessity is the mother of invention – and the genesis of the Chief Information Security Officer role is a perfect example. With…

5 Best Practices for Building an Online Customer Community

5 Best Practices for Building an Online Customer Community

So you’ve decided to build a community. Congrats! As an unbiased (cough, cough) Community Manager myself, it really is an excellent way…

Navigating the Chaos: Security Incident Management in Large Cloud Environments

Navigating the Chaos: Security Incident Management in Large Cloud Environments

It comes as no surprise; as your SaaS deployment grows, usage, data, and incidents all increase simultaneously. If you’re responsible for security…

Google Drive Encryption is Easier Than You Think

Google Drive Encryption is Easier Than You Think

Adopting on premises data security practices in the cloud can be difficult. Organizations are reevaluating traditional approaches – and encryption is no…

5 User Tricks You Didn’t Know About For Drive for Work

5 User Tricks You Didn’t Know About For Drive for Work

Today’s post is by a guest contributor from Mariana McCready of Cloud Sherpas, one of CloudLock’s technology partners. I don’t know about…

123