All Articles

All Articles
New Survey: Public Cloud Workloads

Article Published: 12/10/2016

Public Cloud Workloads Survey Time: 15-20 minutes Closing Date: Jan 9th, 2017 Prizes: 5 CCSK Tokens Go to Survey Abstract: Despite a wide range of commercial software applications, many enterprises still have unique requirements they fulfill with custom, internally developed applications. For ...

IBM Touts Major Mac Cost Savings; IT Professionals Still Hesitant

Blog Published: 12/09/2016

By Lance Logan, Manager/Global Marketing Program, Code42 For the second year in a row, IBM’s Fletcher Previn wowed the audience at the JAMF user conference with impressive statistics on how the company’s growing Mac-based workforce is delivering dramatic and measurable business value. IBM expec...

DevOpsSec, SecDevOps, DevSecOps: What's in a Name?

Blog Published: 12/05/2016

By Jamie Tischart, CTO Cloud/SaaS, Intel Security The world is awash in DevOps, but what does that really mean? Although DevOps can mean several things to different individuals and organizations, ultimately it is about the cultural and technical changes that occur to deliver cloud services in a ...

Insurance Carrot Beats Government Stick in Quest for Stronger Cybersecurity

Blog Published: 12/02/2016

By Laurie Kumerow, Consultant, Code42 When it comes to cybersecurity, the U.S. federal government recognizes the carrot is more effective than the stick. Instead of using regulations to increase data security and protect personal information within private organizations, the White House is enlis...

Cybersecurity in President Trump's America: The first 100 days | Katie Lewin - Federal Director of Cloud Security Alliance Weighs In

Press Release Published: 11/30/2016

It could take months to know what the Trump administration's cybersecurity policy will be. Cyber-defense experts weigh in with advice and best practices for securing your company today. November 28, 2016, 10:15 AM PST From Katie Lewin - Federal Director, Cloud Security Alliance Historically wh...

One Day Is a Lifetime in Container Years

Blog Published: 11/30/2016

By Jon King, Security Technologist and Principal Engineer, Intel Security Securing virtual assets that appear and disappear. The average life span of a container is short and getting shorter. While some organizations use containers as replacements for virtual machines, many are using them incre...

Out of the Shadows

Blog Published: 11/23/2016

By Patty Hatter, Vice President and General Manager, Intel Security Group Professional Services How to Bring Cloud Usage into the Light On any given day – with a quick spot-check – you’ll probably find that up to half of your company’s IT usage is basically hidden in the shadows of various busine...

Cloud Security Alliance Releases Report on State of Cloud Adoption in India

Press Release Published: 11/23/2016

Findings Come on the Heels of Successful CSA APAC Congress in Bengaluru Bengaluru, India – November 22, 2016 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment, su...

Evolving Threats Compel an About-face in Data Protection Strategy

Blog Published: 11/21/2016

By  Vijay Ramanathan, Vice President of Product Management, Code42 It’s time to flip our thinking about enterprise information security. For a long time, the starting point of our tech stacks has been the network. We employ a whole series of solutions on servers and networks—from monitoring and ...

Container Sprawl: The Next Great Security Challenge

Blog Published: 11/18/2016

By Jon King, Security Technologist and Principal Engineer, Intel Security And you thought virtualization was tough on security … Containers, the younger and smaller siblings of virtualization, are more active and growing faster than a litter of puppies. Recent stats for one vendor show containers...

Cloud Security Alliance Launches Crowdfunded Cloud Security Management Solution

Press Release Published: 11/15/2016

STARWatch SaaS Application Empowers Organizations to Manage Compliance & Risks Using CSA Standards and Best Practices SAN FRANCISCO - November 15, 2016 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awareness of best practices to help ...

Fight Against Ransomware Takes to the Cloud

Blog Published: 11/14/2016

By Raj Samani, EMEA CTO, Intel Security “How many visitors do you expect to access the No More Ransom Portal?” This was the simple question asked prior to this law enforcement (Europol’s European Cybercrime Centre, Dutch Police) and private industry (Kaspersky Lab, Intel Security) portal going ...

Personalized Ransomware: Price Set by Your Ability to Pay

Blog Published: 11/11/2016

By Susan Richardson Smart entrepreneurs have long employed differential pricing strategies to get more money from customers they think will pay a higher price. Cyber criminals have been doing the same thing on a small scale with ransomware: demanding a larger ransom from individuals or companies...

Cyber Security Tip for CISOs: Beware of Security Fatigue

Blog Published: 11/04/2016

By Susan Richardson, Manager/Content Strategy, Code42 What’s the most effective thing you can do for cyber security awareness? Stop talking about it, according to a new study that uncovered serious security fatigue among consumers. The National Institute of Standards and Technology study, publis...

CSA'S IOT SECURITY REPORT

Article Published: 11/03/2016

OCTOBER 28, 2016 via RESEARCHandMARKETS, The World's Largest Market Research Store Last week’s DDoS attack was the largest of its kind in history, and shows how easy Internet of Things devices can be compromised and used to conduct massive cyber-attacks. The attack has caused serious concern am...

The Dyn Outage and Mirai Botnet: Using Yesterday's Vulnerabilities to Attack Tomorrow's Devices Today

Blog Published: 11/02/2016

By Jacob Ansari, Manager, Schellman On Oct. 21, Dyn, a provider of domain name services (DNS), an essential function of the Internet that translates names like www.schellmanco.com to its numerical IP address, went offline after a significant distributed denial of service (DDoS) attack affected D...

Cloud Security Alliance Releases Chinese Financial Services Report with Ernst & Young China

Press Release Published: 11/02/2016

Beijing, CHINA – November 1, 2016 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment, and Ernst & Young (EY) China, today released the results of a joint survey...

To Include or Not to Include – Scoping ISO 27001 and Colocation Service Providers

Blog Published: 10/31/2016

By Ryan Mackie, Principal and ISO Certification Services Practice Director, Schellman Introduction ISO 27001 North American GrowthISO/IEC 27001:2015 (ISO 27001) certification is becoming more of a conversation in most major businesses in the United States. To provide some depth, there was a 20% ...

Defeating Insider Threats in the Cloud

Blog Published: 10/27/2016

By Evelyn de Souza, Data Privacy and Security Leader, Cisco Systems  and Strategy Advisor, Cloud Security Alliance Everything we know about defeating the insider threat seems to not be solving the problem. In fact, evidence from the Deep, Dark and Open Web points to a greatly worsening probl...

Everything You've Ever Posted Becomes Public from Tomorrow

Blog Published: 10/26/2016

By Avani Desai, Executive Vice President, Schellman & Co. As I sit here, ironically just wrapping up a privacy conference, scrolling my Facebook wall,  I am seeing dozens of posts from smart, professional, aware people, all posting an apparent disclaimer to Facebook in an atte...

Looking for the CCM?

Start using the Cloud Controls Matrix to simplify compliance with multiple standards & regulations.