
Security and Compliance Blog
Learn security strategies, compare vendors, and implement best practices to prevent breaches and compliance violations from risky third party communications.
Posts by Cliff White

Cliff White, VP of Engineering, Cover
Cliff White is the VP of engineering at Cover and the former CTO at Kiteworks. He has more than 15 years of experience in the software industry and web-based technologies. He has managed global engineering teams and advised C-level executives on software product engineering and best practices. Before joining Kiteworks, Cliff developed highly scalable software for imageshack.com, an online media hosting company and one of the most visited websites on the internet. Previously, he led the engineering function for rentadvisor.com, a peer review and recommendation website for rental properties before it was acquired by apartmentlist.com. Cliff holds a bachelor’s degree in Computer Science from the University of California at Santa Cruz.


Preserve IP and PII With Dynamic Governance Over External Workflows

Remote Wipe: A Must for Mobile Security

Eliminate Shadow IT With Secure Content Access That Doesn’t Slow Workflows

Ransomware Protection in the Age of WannaCry: How to Limit the Impact of an Infection and Speed Recovery

Detect Anomalous Activity Ahead of a Data Breach With Heuristics

Enable Employee Workflows While Preventing Costly Data Breaches

Control Third-party Communication Apps to Protect Your Third-party Workflows

Protect Your IP With Complete Visibility Into Every Sensitive File Exchange

Six Principles for Securing Sensitive Enterprise Content in a Hyper-connected World

Build a Holistic, Proactive Defense Around Your Business Workflows

Keep Malicious Actors Out of Your Private Business Workflows

Achieve Data Security with Strong Internal and External Perimeters

5 Stratégies pour Protéger le Contenu Sensible dans un Monde Dangereusement Connecté
