Coronavirus today and cybersecurity tomorrow
Blog Published: 04/08/2020
By Jim Reavis, Co-Founder and CEO, CSAThe Black Swan event that is Coronavirus is a challenge for our times that we must win. Some may say that this pandemic should not be called a Black Swan event because we had the warning signs. However, the Internet is a great archive and you cannot find a ...
Network Security for the Cloud and Mobile Workforce
Blog Published: 04/08/2020
By Etay Bogner, VP of Zero-Trust Products at ProofpointAn increasing number of enterprises today have made large-scale shifts to cloud-based IT resources by putting their applications in the cloud, subscribing to ready-to-use software-as-a-service (SaaS) applications, and supporting an expanding ...
CSA Federal Summit 2020 Announces New Date, New Focus on Cloud Security as National Security
Press Release Published: 04/08/2020
Cloud security is the first line of defense against critical threatsSEATTLE – April 3, 2020 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications and best practices to help ensure a secure cloud computing environment, announced that...
CSA kicks off project to create a security framework for blockchain and cryptocurrencies.
Blog Published: 04/06/2020
Like many new technologies, many industries are moving ahead with experimentation and deployments of DLT (Distributed Ledger Technology), especially in the finance sector. The benefits offered by DLTs such as tamper evident and tamper proof records, near instant settlement via smart contracts and...
Why use the CAIQ for vendor analysis vs. other questionnaires?
Blog Published: 04/04/2020
Security assessments, security questionnaires, vendor assessments, RFPs are all unavoidable in today’s world of cloud computing and drain valuable resources and time when completing them. However, they’re a big part of closing new deals and maintaining or up-selling to existing accounts. If you a...
Using Open Policy Agent (OPA) to Apply Policy-as-Code to Infrastructure-as-Code
Blog Published: 04/02/2020
Originally published as: Pre-deployment Compliance Checks with Regula and Terraform By Becki Lee, Senior Technical Writer, Fugue, Inc. Infrastructure-as-code is a programmatic way of defining and provisioning cloud resources. By treating infrastructure configuration as code, you can apply program...
IT and Cyber Security Challenges in Healthcare Industry
Blog Published: 03/31/2020
By Salah Nassar, VP of Marketing at CipherCloudThe sudden influx of remote workers due to Coronavirus pandemic has put a strain on business continuity. Many organizations have adopted Virtual Private Networks (VPN) to securely connect with the enterprise data centers. But the VPNs are not designe...
Cloud Security Alliance Inks Knowledge Partnership with ConnecTechAsia
Press Release Published: 03/31/2020
The partnership with CSA will highlight key shifts impacting cloud computing users and enterprisesSingapore, March 31, 2020 – Asia's leading Infocomm, Media and Technology event ConnecTechAsia has inked a knowledge partnership deal with the Cloud Security Alliance (CSA), the world’s leading organ...
7 Steps to Securing Your Remote Work Lifecycle in the Cloud
Blog Published: 03/27/2020
By Martin Johnson, VP Marketing at PolyrizeCurrent global events and government mandates are forcing many organizations that have not, to date, encouraged remote work to suddenly allow their employees en masse to make a quick, often chaotic scramble for the exit and into the safety of their own h...
The Right Questions to Ask Your Vendors in Times of Large-Scale Remote Working
Blog Published: 03/26/2020
By Elad Shapira, Head of Security, PanoraysIn the wake of coronavirus, companies are now applying immediate work-from-home policies. This sudden and massive change poses a set of new cybersecurity risks and is forcing security teams to take immediate action.One of these cybersecurity risks emanat...
Cloud Security for Newly Distributed Engineering Teams
Blog Published: 03/23/2020
By the Fugue Team in collaboration with Dave Williams, cloud architect at New Light Technologies.Employers across the U.S. and around the world are rapidly shifting to a mandatory work-from-home (WFH) arrangement to help slow the spread of the coronavirus (COVID-19). Even for organizations alread...
Continuous Auditing and Continuous Certification
Blog Published: 03/20/2020
By Alain Pannetrat, Senior Researcher at Cloud Security Alliance and Founder of Omzlo.comFor some cloud customers in sensitive or highly-regulated industries, such as banking or healthcare, “traditional” annual or bi-annual audits do not provide enough assurance to move to the cloud. To address t...
Securely Work From Home With CASB
Blog Published: 03/19/2020
By Neeraj Nayak, Senior Manager, Product Marketing at CipherCloudThe world is witnessing an unseen and unprecedented trend in the past few weeks. While advanced persistent threats have caused an upward trend in data breaches and cybercrime, the introduction of a certain other virus has led multin...
New Threat Intelligence Report Reveals the Rise of Emotet
Blog Published: 03/16/2020
By Renatta Siewert, Senior Security Writer at MimecastThe Mimecast Threat Center launched the Threat Intelligence Report: RSA Conference Edition on February 25th, finding a 145% increase in attack campaigns across the globe from October to December. Researchers believe the increase can be attribu...
Registration Now Open for SECtember, Cloud Security Alliance’s Premier Event
Press Release Published: 03/16/2020
Annual conference to provide global perspective on strategic cloud, cybersecurity issues SEATTLE – March 16, 2020 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications and best practices to help ensure a secure cloud computing envir...
California Consumer Privacy Act – 10 Things You Should Know
Blog Published: 03/12/2020
By Francoise Gilbert, Data & Privacy Expert, DataMinding.comThis blog originally appeared on Francoise Gilbert's blog here, read more updates around privacy by going to here website DataMinding.com.Based on personal observation and press reports, it is clear that only a small percentage of bu...
Newest Cloud Security Alliance Paper Sheds Light on Best Practices for Managing Risks Associated with Cloud-Connected Medical Devices
Press Release Published: 03/12/2020
Paper provides key stakeholders with guidelines to procuring, securing medical devices to ensure vulnerabilities are mitigatedSEATTLE – March 12, 2020 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure...
CSA’s Certificate of Cloud Security Knowledge (CCSK) Is Now an Accepted Ohio TechCred® Credential
Press Release Published: 03/11/2020
Ohio program allows employers to upskill their employees’ cloud security knowledge, build a stronger, tech-savvy workforceSEATTLE – March 11, 2020 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a s...
CSA’s Certificate of Cloud Security Knowledge Named Winner in 16th Annual Info Security PG’s 2020 Global Excellence Awards®
Press Release Published: 03/09/2020
Industry’s leading cloud certification program earned GoldSEATTLE – March 9, 2020 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment, announced today that Info Secu...
RSA Conference 2020: Focusing on Human-Centric Security
Blog Published: 03/06/2020
By Salah Nassar, VP of Marketing at CipherCloudWithout a doubt, the top focus at the RSA Conference 2020 was human/people-centric security. This year’s conference messaging focused on the Human Element – which makes perfect sense. We are in a time of cloud mobile digital transformation, in which ...