All Articles

All Articles
Five Prevention Tips and One Antidote for Ransomware

Blog Published: 10/25/2016

By Susan Richardson, Manager/Content Strategy, Code42 During National Cyber Security Awareness Month, understanding the ins and outs of ransomware seems particularly important—given the scandalous growth of this malware. In this webinar on ransomware hosted by SC Magazine, guest speaker John Kin...

Happy Birthday to… Wait, Who’s This Guy?

Blog Published: 10/11/2016

By Jacob Ansari, Manager, Schellman How many arbitrary people do you have to get into a room before two of them share the same birthday? Probability theory has considered this problem for so long that no one is quite certain who first posed the so-called “birthday problem” or “birthday paradox.”...

Minister Denis Naughten to Address EU Security Directive at (ISC)2 Security Congress EMEA

Blog Published: 10/11/2016

Denis Naughten will address (ISC)2 Security Congress EMEA delegates on the latest developments in Ireland’s National Cyber Security Strategy since its launch in 2015, including the requirement to transpose the European Union Security of Network and Information Systems Directive (2016/1148) into n...

CSA Internet of Things Working Group Releases Industry’s First Guidance for Securing IoT Product Ecosystem

Press Release Published: 10/07/2016

‘Designing and Developing Secure IoT Products’ Provides Actionable and Useful Guidance to Raise the Overall Security of IoT Products San Jose, CA – CSA Congress 2016 – October 7, 2016 – The Cloud Security Alliance (CSA) today released a new detailed and hefty guidance report titled Future-proofi...

Cloud Security Alliance EMEA to Host Fifth Annual Congress

Press Release Published: 10/07/2016

Agenda and Keynote Speakers Announced for Premiere European Cloud Security Event MADRID, SPAIN – October 7, 2016 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment...

HIPAA Violations Examples and Cases – Eight Cautionary Tales

Blog Published: 10/06/2016

By Ajmal Kohgadai, Product Marketing Manager, Skyhigh Networks The Health Insurance Portability and Accountability Act (HIPAA) helps protect patient privacy by requiring healthcare organizations and their business associates to protect sensitive data — including how the data is used and disclose...

Cloud Security Alliance Asia Pacific Hosts Financial Cloud Forum in Shanghai

Press Release Published: 10/05/2016

Organization Announces Upcoming Research and Future Events in Region Shanghai, China – October 6, 2016 -- The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment, today o...

Ransomware: Just Say No to Stronger Scare Tactics

Blog Published: 10/04/2016

By Susan Richardson, Manager/Content Strategy, Code42 Ah, those ingenious cyber criminals. They keep coming up with ever more frightening ransomware threats. JIGSAW warns victims it will delete files every hour until they pay $150 USD in bitcoins. Chimera threatens to publish the victim’s files ...

Open Peer Review - Quantum-Safe Security Glossary

Article Published: 09/27/2016

The Cloud Security Alliance would like to invite you to review and comment on the Quantum-Safe Security working group's latest document, Quantum-Safe Security Glossary. This document is the latest in a series of documents from the working group introducing quantum computing. This document is inte...

Open Peer Review - Applied Quantum-Safe Security: Quantum Resistant Algorithms and Quantum Key Distribution position paper

Article Published: 09/27/2016

The Cloud Security Alliance would like to invite you to review and comment on the Quantum-Safe Security working group's latest document, Applied Quantum-Safe Security: Quantum Resistant Algorithms and Quantum Key Distribution. This document is the latest in a series of documents from the working ...

ReadITQuick Interview with Executive Vice President of Research at CSA - Luciano Santos

Press Release Published: 09/23/2016

ReadITQuick interview by Meghna Lal, September 21, 2016, with Luciano Santos, Executive Vice President of Research at Cloud Security Alliance. Full Interview at ReadITQuik.com

Ran$umBin: Disruptive Innovation for the Black Market

Blog Published: 09/22/2016

By Susan Richardson, Manager/Content Strategy, Code42 Sometimes the ingenuity of the free market is truly remarkable. And in the case of the new black market for ransomed data, remarkably scary. One of the latest triumphs of the entrepreneurial spirit is Ran$umBin, a sort of eBay for ransomers—o...

Cloud Security Alliance Announces Annual Ron Knode Service Award Recipients

Press Release Published: 09/15/2016

Contributions from Six Dedicated Individual CSA Volunteers Recognized in Honor of the Late CSA Member and Volunteer Contributor Ron Knode SAN JOSE, CA – CSA Congress US – September 15, 2016 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising aw...

EFSS Spreads Ransomware; Endpoint Backup Guarantees Recovery

Blog Published: 09/14/2016

By Kyle Hatlestad, Principal Architect, Code42 One of the objections I’m hearing more and more is, “Why do I need backup when I have Microsoft OneDrive for Business (or Google Drive, Box or Dropbox for Business)?” On the surface, it may seem like endpoint backup isn’t needed because with an ente...

Eight Questions to Ask When Evaluating a CASB

Blog Published: 09/12/2016

By Rich Campagna, Vice President/Products & Marketing, Bitglass Cloud Access Security Brokers are the hottest technology in enterprise security right now, topping Gartner's Top 10 list two years running. Widespread adoption of major cloud apps like Office 365 (and corresponding cloud securit...

Data Privacy Survey: First 50 respondents get $20 Amazon gift cards – 300+ participants needed

Article Published: 09/09/2016

Data Privacy and Digital Transformation Survey Prizes: $20 Amazon Gift Cards for the first 50 respondents, Ring Video Doorbell, 10 CCSK Tokens Time: 10 minutes Abstract: Cloud-based technologies are driving digital transformation, but new data privacy regulations are hampering adoption. We’d l...

Cybersecurity: “Change or Die”

Blog Published: 09/09/2016

By Paul B. Kurtz, CEO TruSTAR Technology and Member of Board of Directors, Cloud Security Alliance “Change or die” is an old phrase computer programmers use to highlight the speed of change in a world of innovation. Its implications go beyond programming and underscore the precarious situation w...

WSJ Warns of Ransomware—Misses the Obvious Solution

Blog Published: 09/09/2016

By Susan Richardson, Manager/Content Strategy, Code42 Read through the recent Wall Street Journal ransomware article and you’ll find some great stats on the growing threat and cost. One thing you won’t find: the word “backup.” We’re happy to see ransomware finally getting the attention it deserv...

Dealing with Dropbox: Unmasking Hackers with User Behavior Analytics

Blog Published: 09/07/2016

By Ganesh Kirti, Founder and CTO, Palerra Dropbox was in the news a few months ago due to false reports of a data breach. Unfortunately, they’ve made headlines again. Vice reported that hackers stole over 60 million account details for the cloud storage service. This time, the breach is real, an...

Five IT Security Projects That Will Accelerate Your Career

Blog Published: 09/07/2016

By Cameron Coles, Director of Product Marketing, Skyhigh Networks The skills required to be successful in IT security are changing. In a recent survey (download a free copy here) 30.7% IT leaders reported that a lack of skilled IT professionals is the greatest barrier to preventing data loss. ...

Looking for the CCM?

Start using the Cloud Controls Matrix to simplify compliance with multiple standards & regulations.