All Articles

All Articles
Open Peer Review: Cloud Data Center Security Working Group Charter

Article Published: 04/20/2016

The Cloud Security Alliance would like to invite you to review and comment on a proposed Cloud Data Center Security Working Group Charter. The focus of the Cloud Data Center Security working group is to develop and maintain a research portfolio providing capabilities to assist the cloud provider ...

May the Fourth Be with EU

Blog Published: 04/20/2016

Data Privacy Gets a Stronger Light Saber By Nigel Hawthorn, EMEA Marketing Director, Skyhigh Networks On April 14, 2016, the EU Parliament passed the long-awaited new EU rules for personal data protection (GDPR). Everyone who holds or processes data on individuals in the 28 countries of the EU h...

CloudBytes Webinars in May

Article Published: 04/20/2016

We have several interesting webinars coming up in May! Meeting international requirements and leveraging CSA STAR for supply chain management John DiMaria of BSI May 4th--10am PST https://www.brighttalk.com/webcast/10415/197749 Improve CX, Productivity, Revenues and Security with Identity Coher...

WP29: Thumbs Down to Draft EU-US Privacy Shield

Blog Published: 04/20/2016

By  Françoise Gilbert,Global Privacy and Cybersecurity Attorney, Greenberg Traurig In a 58-page opinion published April 13, 2016, the influential European Union Article 29 Working Party (WP29), which includes representatives of the data protection authorities of the 28 EU Member States, expresse...

BYOD Stalled? Three Tips to Get It Going

Blog Published: 04/19/2016

By Susan Richardson, Manager/Content Strategy, Code42 Despite some surveys that say Bring Your own Device (BYOD) is growing, the CyberEdge Group’s recently released 2016 Cyberthreat Defense Report found that enterprise BYOD programs have stalled. Only one-third of respondents this year had imple...

Open Survey: Defeating Insider Threats

Article Published: 04/13/2016

We have a new survey entitled "Defeating the Insider Threat and Shoring up the Data Security Lifecycle" Participate now Time: 10-15 minutes Prizes: 5 CCSK Tokens Goal of the Survey: Everything we know about defeating the insider threat seems not to be solving the problem. In fact, evidence fr...

Panama Papers Expose Data Security Deficiencies in Law Firms

Blog Published: 04/12/2016

By Rick Orloff, Chief Security Officer, Code42 The unprecedented leak of 11.5 million files from the database of the world’s fourth biggest offshore law firm is riveting. As details continue to emerge about the Panama Papers leak, the money laundering and secretive tax regimes and high-profile c...

CSA Releases New White Paper on Current Cloud Certification Challenges Ahead and Proposed Solutions

Blog Published: 04/11/2016

By Daniele Catteddu, Chief Technology Officer, Cloud Security Alliance Today, the Cloud Security Alliance has released the CSA STAR Program & Open Certification Framework in 2016 and Beyond, an important new whitepaper that has been created to provide the security community with a descriptio...

How CASB Is Different from Web Proxy / Firewall

Blog Published: 04/08/2016

By Cameron Coles, Sr. Product Marketing Manager, Skyhigh Networks A common question that arises as IT teams begin to look at cloud access security broker (CASB) products goes something like, “we already have a web proxy and/or firewall, how is this different?” or “does CASB replace my web proxy ...

How to Get C-suite Support for Insider Threat Prevention

Blog Published: 04/06/2016

By Susan Richardson, Manager/Content Strategy, Code42 If you’re not getting support and adequate funding from the C-suite to address insider threats, a recent report highlights a powerful persuasive tool you may have overlooked: money—as in fines (cha-ching), lawsuits (cha-ching) and credit moni...

Don’t Let Your Cloud Security Strategy Get Railroaded by Old Thinking

Blog Published: 04/04/2016

By Player Pate, Senior Manager/Product Marketing, Cisco Security Business Group The standard gauge used for railroads (that is the distance between the rails) in the U.S. is four feet, eight and a half inches, which is an odd number however you look at it. The history behind it is even stranger ...

Cloud Security Alliance Releases Results of Software-Defined Perimeter Hackathon

Press Release Published: 03/31/2016

CSA, The World’s Leading Cloud Organization Collaborated with Verizon and Vidder To Validate Security and Feasibility of High Availability Public Cloud Architecture at Fourth Annual CSA Hackathon at the RSA Conference 2016 SEATTLE, WA – March 31, 2016 – The Cloud Security Alliance (CSA), today r...

Four Security Solutions Not Stopping Third-Party Data Breaches

Blog Published: 03/31/2016

By Philip Marshall, Director of Product Marketing, Cryptzone A new breed of cyberattack is on the rise. Although it was practically unheard of a few years ago, the third-party data breach is rapidly becoming one of the most infamous IT security trends of modern times: Target, Home Depot, Goodwil...

Kicking Tires on World Backup Day: A Five-Point Inspection for Endpoint Backup

Blog Published: 03/29/2016

By Rachel Holdgrafer, Business Content Strategist, Code42 Living with the constant threat of data breach or loss, large organizations have comprehensive remediation plans designed to guarantee speedy data recovery and business continuity. March 31, 2016 is World Backup Day—the perfect time to ev...

April CloudByte Webinars

Article Published: 03/28/2016

We have a ton of CloudBytes coming up in April! Click the links below each description to learn more or save your seat. If you want to see all upcoming and past CloudBytes click here: https://cloudsecurityalliance.org/research/cloudbytes/ Best Practices for Protecting Your Data in a Multi- and H...

Top 3 Malware Bogeymen Keeping CISOs Up at Night

Blog Published: 03/22/2016

By Susan Richardson, Manager/Content Strategy, Code42 What keeps CISOs up at night? Of all the cyberthreats, malware sends chills down a CISO’s spine, according to The CyberEdge Group’s recently released 2016 Cyberthreat Defense Report. Malware bogeymen come in many shapes and sizes. Here are th...

CIO, CISO and IT Practitioners Worry They Will Face a Datastrophe!

Blog Published: 03/18/2016

By Rick Orloff, Chief Security Officer, Code42 We are not lacking choices: whether it’s in the information we consume, the things we can buy or the ability to express ourselves through multimedia channels. It’s therefore no surprise that our most valuable asset, human capital, is finding ways to...

EU Safe Harbor and Privacy Shield: Timelines, Deadlines and Red Lines

Blog Published: 03/16/2016

What has happened since safe harbor was declared invalid and what’s next? By Nigel Hawthorne, EMEA Marketing Director, Skyhigh Networks As a quick reminder, Safe Harbor was the primary legal mechanism that allowed US-based companies and cloud providers to transfer data on European individuals t...

CSA Summit San Francisco 2016 Recap

Blog Published: 03/11/2016

By Frank Guanco, Research Project Manager, CSA Global At the end of February, the Cloud Security Alliance (CSA) concluded its CSA Summit San Francisco 2016 with a full slate of presentations, releases, and announcements. CSA Summit kicked off the week with a full day of speakers and panels on ...

Between SSL-cylla and Charib-TLS

Blog Published: 03/11/2016

By Jacob Ansari, Manager, Schellman & Company, Inc. Securing encrypted Internet traffic transmissions, such as those between web browsers and web servers, is decidedly not simple. Despite the fact that well-established protocols, namely Secure Sockets Layer (SSL) and Transport Layer Security...

Looking for the CCM?

Start using the Cloud Controls Matrix to simplify compliance with multiple standards & regulations.