All Articles

All Articles
CloudBytes Webinar: CSA Top Threats

Press Release Published: 02/19/2016

CloudBytes Webinar: CSA Top Threats Learn more about the CSA Top Threats Report with HPE Security-Data Security The Borderless World: Bridging the Cloud with On-Prem Systems In the borderless world of Cloud computing, everything changes. You cannot deliver a cloud enabled business without a fu...

Something’s Gotta Give, And It’s You

Blog Published: 02/17/2016

By David Payne, VP Systems Engineering, Code42 IT has lost the ability to unilaterally command which software employees access and what devices they carry. Anybody with a credit card can get the tools he or she needs to work fast and unencumbered. This freedom has significant impact on data secu...

Cloud Security Alliance APAC Summit 2016 Set to Open for CloudAsia

Press Release Published: 02/12/2016

Cloud Security Alliance and Infocomm Development Authority (IDA) partners to deliver international perspective at CloudAsia SINGAPORE – February 12, 2016 - Cloud Security Alliance Asia Pacific (CSA APAC) is proud to announce that this year’s CSA APAC Summit will be the curtain opener for Infocom...

Tentative Safe Harbour Agreement Reached—For Now

Blog Published: 02/12/2016

By Rachel Holdgrafer, Business Content Strategist, Code42 The European Union and the United States have reached a preliminary agreement that would allow companies doing business on both sides of the Atlantic to resume transmitting individuals’ digital data. Struck down in October 2015 for faili...

Can Wanted Cybercriminals Be Stopped?

Blog Published: 02/11/2016

By Leo Taddeo,  ‎Chief Security Officer, Cryptzone Part 2 of a 2-part series I recently wrote about the challenges around cybercrime reporting in the US. Organizations often fail to notify law enforcement after discovering a network intrusion – partly because of a reluctance on their part to ad...

Five Surprising Truths from the Cloud Security Alliance’s Latest Survey

Blog Published: 02/08/2016

Survey of 200 it leaders finds that cloud perceptions, it security reporting structures, and cloud security approaches are changing By Cameron Coles, Senior Product Marketing Manager, Skyhigh Networks After years of IT leaders loudly voicing their concerns about the security of the cloud, trust...

Cloud Security Alliance to Host Fourth Software Defined Perimeter Hackathon; Top Prize of $10,000 up for Grabs

Press Release Published: 02/04/2016

Participants Invited to Attack Mission-Critical Cloud Application Architecture at RSA Conference; Verizon to Lead Testing Effort San Francisco, Calif. (RSA Conference Booth #S2614) – Feb. 4, 2016 - The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and rais...

Improving Data Privacy One Employee at a Time

Blog Published: 02/04/2016

By Rick Orloff, ‎Vice President and Chief Security Officer, Code 42 It’s no Hallmark holiday, but here at Code42, Data Privacy Day is kind of a big deal. We think it should be a big deal for your organization, too. It’s a great chance to focus on the biggest security threat in your organization:...

You’ve Been the Victim of a Cybercrime. Who You Gonna Call?

Blog Published: 02/02/2016

By Leo Taddeo,  ‎Chief Security Officer, Cryptzone Part 1 of a 2-part series Right now, one of the greatest challenges in the fight against cybercrime is the difficulty we have in creating a meaningful deterrent for hackers. Basically, the number of cybercriminals out there is demonstrably ver...

What They’re Not Telling You About Global Deduplication

Blog Published: 01/29/2016

By Rachel Holdgrafer, Business Content Strategist, Code42 When it comes to endpoint backup, is global deduplication a valuable differentiator? Not if data security and recovery are your primary objectives. Backup vendors that promote global deduplication say it minimizes the amount of data tha...

Early bird discount for CSA CEE Summit 2016 ends soon!

Article Published: 01/28/2016

We would like to invite you to the 4th CSA CEE Summit that will take place on the March 8th in Ljubljana. The event topic is Public Cloud Security - What is easy and what is missing? Summit will present practical solutions for the challenges faced when transitioning to the cloud and treating sec...

Serious Cybersecurity Challenges Ahead in 2016

Blog Published: 01/28/2016

By Phillip Marshall,  Director of Product Marketing, Cryptzone By now you’ll have settled into the New Year, looking ahead at what’s to come as we move swiftly through January. However, there are numerous unsettling predictions that mean 2016 is a year of many serious cybersecurity challenges – ...

Open Survey: Enterprise Hybrid Cloud Security

Article Published: 01/26/2016

Hybrid cloud is a cloud deployment model using at least two different cloud deployment models (e.g. private, public, community). The deployments involved remain unique entities but are bound together by appropriate technology that enables interoperability, data portability and application portabi...

Open Peer Review: The Treacherous 12 - Cloud Computing Top Threats in 2016

Article Published: 01/23/2016

The Cloud Security Alliance would like to invite you to review and comment on the Top Threats Working Group's survey report, The Treacherous 12 - Cloud Computing Top Threats in 2016. The survey report shares findings and analysis from the Top Threats Working Group's survey from late 2015. The rev...

Open Peer Review: CCM v3.0.1 with ISO 27002/27017/27018 Candidate Mapping

Article Published: 01/23/2016

The Cloud Security Alliance would like to invite you to review and comment on the update to the Cloud Controls Matrix (CCM) v3.0.1. The update includes the ISO 27002/27017/27018 candidate mapping. In addition, there were minor updates that included spelling, style, and punctuation. This is your ...

2015 Breaches Show That Current Cybersecurity Measures Aren’t Enough

Blog Published: 01/22/2016

By Corey Williams, Senior Director/Product Management and Marketing, Centrify Last year my colleague Chris Webber predicted that "Breach Headlines will Change IT Security Spend." Unfortunately the breach headlines of 2015 were even more striking than most could predict. 2015 breaches involved hi...

Containers Aren’t New, But Ecosystem Growth Has Driven Development

Blog Published: 01/21/2016

By Thomas Campbell, Container World 2016 Containers are getting a fair bit of hype at the moment, and February 2016 will see the first ever event dedicated to both the business and technical advantages of containers take place in Silicon Valley in the US. Here, Container World talks to Kyle A...

What Is Data Deduplication and Who Cares?

Blog Published: 01/19/2016

By Rachel Holdgrafer, Business Content Strategist, Code42 Data deduplication is a critical component of managing the size (and cost) of a continuously growing data store that you will hear about when you research endpoint backup. Intelligent compression or “single-instance storage” eliminates re...

Privileged-Account Attacks Are Behind Every Major Cyber Crime

Blog Published: 01/14/2016

By Susan Richardson, Manager/Content Strategy, Code42 It’s unsettling: the people most accountable for an organization’s security are those most likely to compromise it. Privileged user accounts—IT administrators, application developers and C-suite executives—have been the cause of high-profile ...

CSA Survey: 64.9% of IT Trusts the Cloud as Much or More than On-Premises Solutions

Press Release Published: 01/13/2016

Sponsored by Skyhigh Networks, New Report Highlights Shift in Strategy Around Cloud Adoption and Security Seattle, WA – January 13, 2015 – Cloud Adoption does not have to mean opening up your organization to increased security risks and threats if the right policies are in place. That’s what the...

Looking for the CCM?

Start using the Cloud Controls Matrix to simplify compliance with multiple standards & regulations.