All Articles

All Articles
Spotlight on Enterprise Grade Cloud Security at Cloud Security Alliance’s Annual CSA Summit at RSA Conference 2018

Press Release Published: 02/12/2018

Chief Executives from Leading Global Companies Talk Cloud as the New Dominant IT System; Registration Now Open San Francisco, CA – February 7, 2018 – RSA Conference 2018 -- The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awareness of best pra...

Cloud Security Alliance Issues State of ERP Security in the Cloud Report

Press Release Published: 02/12/2018

Newest research paper examines security, privacy challenges of migrating ERP systems to the cloud SEATTLE, WA – February 12 - 2018 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud c...

Volunteers Needed: Blockchain/Distributed Ledger Working Group

Press Release Published: 02/12/2018

The CSA Blockchain and Distributed Ledger Working Group is searching for volunteers to participate in the development of whitepapers on blockchain use cases and guidance for implementing blockchain technology. The working group is looking for volunteers who have expertise in the financial sector ...

Saturday Security Spotlight: Military, Apps, and Threats

Blog Published: 02/12/2018

By Jacob Serpa, Marketing Manager, Bitglass Here are the top cybersecurity stories of recent weeks: —Fitness app exposes military bases —Soldiers' names revealed by app —Google Play filled with fake apps —Medical devices easily hacked —The internet of things creates risk for the enterprise Fi...

Why Next-Gen Firewalls Can't Replace CASBs

Blog Published: 02/07/2018

By Joe Green, Vice President,/WW Solutions Engineering, Bitglass A security solution is only as good as the data it protects. Some solutions focus on data protection on the corporate network, others focus entirely on cloud data, and a select few enable security at access from any network. Next...

EMV Chip Cards Are Working - That's Good and Bad

Blog Published: 02/02/2018

By Rich Campagna, CEO, Bitglass For many years, credit card companies and retailers ruled the news headlines as victims of breaches. Why? Hackers' profit motives lead them to credit card numbers as the quickest path to monetization. Appropriate data in hand and a working counterfeit card could b...

Saturday Security Spotlight: Cyberwarfare and Cryptocurrency

Blog Published: 01/29/2018

By Jacob Serpa, Product Marketing Manager, Bitglass Here are the top cybersecurity stories of recent weeks: —Cyberattacks deemed a top threat to society —Hackers target data around the world —Poor app designs threaten countries' infrastructure —Olympic Committee emails leaked by hackers...

Cloud Security Alliance Releases Quantum-Safe Security Awareness Survey Report

Press Release Published: 01/26/2018

Newest paper finds that despite awareness of threat posed by quantum computing, little is being done to prepare SEATTLE, WA – January 26, 2018 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secu...

Nine Myths of Account Takeover

Blog Published: 01/25/2018

By Dylan Press, Director of Marketing, Avanan Account takeover attacks are a nearly invisible tactic for conducting cyber espionage. Because these breaches can take months or years to detect, we are slowly discovering that this attack vector is much more common than we thought. The more we learn...

Cloud App Encryption and CASB

Blog Published: 01/19/2018

  By Kyle Watson, Partner/Information Security, Cedrus Digital Many organizations are implementing Cloud Access Security Broker (CASB) technology to protect critical corporate data stored within cloud apps. Amongst many other preventative and detective controls, a key feature of CASBs is the ab...

Saturday Morning Security Spotlight: Breaches and Intel

Blog Published: 01/15/2018

By Jacob Serpa, Product Marketing Manager, Bitglass Here are the top cybersecurity stories of recent weeks: —Data on 123 million US households leaked —Tech giants investing in healthcare technology —Intel chips contain security vulnerability —DHS suffers breach of over 247,000 records —Forever...

Your Top Three Cloud Security Resolutions for 2018 Categories: Blog, Cloud Security

Blog Published: 01/11/2018

By  Doug Lane, Vice President/Product Marketing, Vaultive With 2017 behind us, it’s time to prepare your IT strategy and goals for the new year. There is a good chance that, if you aren’t using the cloud already, there’s a cloud services migration in store for your organization this year. No mat...

Cloud Access Security Brokers: Past, Present, and Future

Blog Published: 01/09/2018

By Jacob Serpa, Product Marketing Manager, Bitglass Leading cloud access security brokers (CASBs) currently provide data protection, threat protection, identity management, and visibility. However, this has not always been the case.  Since the inception of the CASB market, cloud access security ...

Launching of Application Containers and Microservices

Article Published: 01/05/2018

The Cloud Security Alliance is launching the Application Containers and Microservices (ACM) Working Group. The CSA ACM Working Group previously work with the National Institute of Standards and Technology (NIST) ACM Working Group to provide research, guidance, and best practices for the secure us...

The Stakes for Protecting Personally Identifiable Information Will Be Higher in 2018

Blog Published: 01/04/2018

By  Doug Lane, Vice President/Product Marketing, Vaultive While it’s tough to predict what the most significant single threat of 2018 will be, it’s safe to say that 2017 was certainly a wake-up call for both businesses and consumers when it comes to data breaches. From the rampant misconfigurati...

Saturday Morning Security Spotlight: Jail Breaks and Cyberattacks

Blog Published: 12/29/2017

By Jacob Serpa, Product Marketing Manager, Bitglass Here are the top cybersecurity stories of recent weeks: — Man attempts prison break through cyberattacks — Mailsploit allows for perfect phishing attacks — 1.4 billion credentials found in dark web database — Starbucks WiFi hijacks connected...

Adding Value to Native Cloud Application Security with CASB

Blog Published: 12/27/2017

By Paul Ilechko, Senior Security Architect, Cedrus Many companies are starting to look at the Cloud Access Security Broker (CASB) technology as an extra layer of protection for critical corporate data as more and more business processes move to the cloud. CASB technologies protect critical corp...

It Could Happen To You

Blog Published: 12/20/2017

By  Yael Nishry, Vice President/Business Development, Vaultive; Arthur van der Wees LLM, Arthur’s Legal; and Jiri Svorc LLM, Arthur’s Legal For organizations around the world, implementing state-of-the-art security and personal data protection (using both technical and organizational measures) i...

Avoid a Breach: Five Tips to Secure Data Access

Blog Published: 12/18/2017

By Jacob Serpa, Product Marketing Manager, Bitglass Although the cloud is a boon to productivity, flexibility, and cost savings, it can also be a confusing tool to utilize properly. When organizations misunderstand how to use it, they often expose themselves to threats. While there aren’t necess...

MSP: Is Your New Digital Service Compliant?

Blog Published: 12/15/2017

By Eitan Bremler, VP Marketing and Product Management, Safe-T Data Offering managed services seems like an easy proposition. You offer IT services for companies that don't have the infrastructure to support their own, bundle in services like cloud storage or remote desktop access, then sit back ...

Looking for the CCM?

Start using the Cloud Controls Matrix to simplify compliance with multiple standards & regulations.