![](https://www.kiteworks.com/wp-content/uploads/2019/12/maintain-control-of-your-most-sensitive-content-with-a-private-or-on-premises-cloud-560x360.jpg)
Security and Compliance Blog
Learn security strategies, compare vendors, and implement best practices to prevent breaches and compliance violations from risky third party communications.
Posts by Cliff White
![Cliff White, VP of Engineering, Cover Cliff White, VP of Engineering, Cover](/wp-content/uploads/2022/01/cliff-white-480x480-1.webp)
Cliff White, VP of Engineering, Cover
Cliff White is the VP of engineering at Cover and the former CTO at Kiteworks. He has more than 15 years of experience in the software industry and web-based technologies. He has managed global engineering teams and advised C-level executives on software product engineering and best practices. Before joining Kiteworks, Cliff developed highly scalable software for imageshack.com, an online media hosting company and one of the most visited websites on the internet. Previously, he led the engineering function for rentadvisor.com, a peer review and recommendation website for rental properties before it was acquired by apartmentlist.com. Cliff holds a bachelor’s degree in Computer Science from the University of California at Santa Cruz.
![](https://www.kiteworks.com/wp-content/uploads/2019/12/maintain-control-of-your-most-sensitive-content-with-a-private-or-on-premises-cloud-560x360.jpg)
![](https://www.kiteworks.com/wp-content/uploads/2019/12/protect-your-digital-assets-with-unified-access-to-enterprise-content-repositories-560x360.jpg)
Protect Your Digital Assets with Unified Access to Enterprise Content Repositories
![](https://www.kiteworks.com/wp-content/uploads/2019/11/secure-and-empower-employee-workflows-with-enterprise-application-plugins-560x360.jpg)
Secure and Empower Employee Workflows With Enterprise Application Plugins
![](https://www.kiteworks.com/wp-content/uploads/2019/08/avoid-data-breaches-with-a-secure-inner-perimeter-around-your-digital-assets-560x360.jpg)
Avoid Data Breaches With a Secure Inner Perimeter Around Your Digital Assets
![](https://www.kiteworks.com/wp-content/uploads/2019/07/eliminate-shadow-it-with-secure-content-access-that-doesnt-slow-workflows-560x360.jpg)
Eliminate Shadow IT With Secure Content Access That Doesn’t Slow Workflows
![Balance Content Security and Content Access With Granular Governance](https://www.kiteworks.com/wp-content/uploads/2019/05/Balance-Content-Security-and-Content-Access-With-Granular-Governance-560x360.jpg)
Balance Content Security and Content Access With Granular Governance
![](https://www.kiteworks.com/wp-content/uploads/2019/05/enable-employee-workflows-while-preventing-costly-data-breaches-560x360.jpg)
Enable Employee Workflows While Preventing Costly Data Breaches
![](https://www.kiteworks.com/wp-content/uploads/2019/04/protect-your-ip-with-complete-visibility-into-every-sensitive-file-exchange-1-560x360.jpg)
Protect Your IP With Complete Visibility Into Every Sensitive File Exchange
![](https://www.kiteworks.com/wp-content/uploads/2019/03/six-principles-for-securing-sensitive-enterprise-content-in-a-hyper-connected-world-1-560x360.jpg)
Six Principles for Securing Sensitive Enterprise Content in a Hyper-connected World
![](https://www.kiteworks.com/wp-content/uploads/2019/02/build-a-holistic-proactive-defense-around-your-business-workflows-1-560x360.jpg)
Build a Holistic, Proactive Defense Around Your Business Workflows
![](https://www.kiteworks.com/wp-content/uploads/2019/02/keep-malicious-actors-out-of-private-business-workflows-560x360.jpg)
Keep Malicious Actors Out of Your Private Business Workflows
![](https://www.kiteworks.com/wp-content/uploads/2019/01/achieve-data-security-with-strong-internal-and-external-perimeters-1-560x360.jpg)
Achieve Data Security with Strong Internal and External Perimeters
![](https://www.kiteworks.com/wp-content/uploads/2018/12/visualize-your-sensitive-content-protect-your-sensitive-content-560x360.jpg)
Visualize Everyday Workflow Threats to Prevent Data Breaches
![](https://www.kiteworks.com/wp-content/uploads/2018/11/5-strategies-for-protecting-sensitive-content-in-a-dangerously-connected-world-1-560x360.jpg)
5 Strategies for Protecting Sensitive Content in a Dangerously Connected World
![](https://www.kiteworks.com/wp-content/uploads/2017/05/ransomware-protection-in-age-of-wannacry-560x360.jpg)