Cloud 101CircleEventsBlog

All Articles

All Articles
The Many Benefits of a Cloud Access Security Broker

Blog Published: 04/19/2019

By Will Houcheime, Product Marketing Manager, BitglassToday, organizations are finding that storing and processing their data in the cloud brings countless benefits. However, without the right tools (such as cloud access security brokers (CASBs), they can put themselves at risk. Organizations’ IT...

CCSK Success Stories: From a Data Privacy Consultant

Blog Published: 04/16/2019

By the CSA Education Team This is the fourth part in a blog series on cloud security training, in which we will be interviewing Satishkumar Tadapalli a certified and seasoned information security and data privacy consultant. Tadapalli has 12+ years of multi-functional IT experience in pre-sales,...

Prying Eyes Inside the Enterprise: Bitglass' Insider Threat Report

Blog Published: 04/12/2019

By Jacob Serpa, Product Marketing Manager, BitglassWhen words like cyberattack are used, they typically conjure up images of malicious, external threats. While hackers, malware, and other outside entities pose a risk to enterprise security, they are not the only threats that need to be remediated...

CSA STAR – The Answer to Less Complexity and Higher Level of Compliance

Blog Published: 03/28/2019

By John DiMaria, Assurance Investigatory Fellow, Cloud Security AllianceCSA STAR enables a higher level of compliance, data governance, reduced risk and more cost-effective management of your security and privacy systemWe just launched a major refresh of the CSA STAR (Security, Trust and Assuranc...

Healthcare Breaches and the Rise of Hacking and IT Incidents

Blog Published: 03/27/2019

By Jacob Serpa, Product Marketing Manager, BitglassIn the course of their day-to-day operations, healthcare organizations handle an extensive amount of highly sensitive data. From Social Security numbers to medical record numbers and beyond, it is imperative that these personal details are proper...

12 Ways Cloud Upended IT Security (And What You Can Do About It)

Blog Published: 03/25/2019

This article was originally published on Fugue's blog here.By Andrew Wright, Co-founder & Vice President of Communications, FugueThe cloud represents the most disruptive trend in enterprise IT over the past decade, and security teams have not escaped turmoil during the transition. It’s unders...

Better Vulnerability Management: How to Master Container Security in Three Steps

Blog Published: 03/21/2019

By Nate Dyer, Product Marketing Director, TenableApplication containers like Docker have exploded in popularity among IT and development teams across the world. Since its inception in 2013, Docker software has been downloaded 80 billion times and more than 3.5 million applications have been “dock...

Continuous Auditing - STAR Continuous - Increasing Trust and Integrity

Blog Published: 03/19/2019

By John DiMaria, Assurance Investigatory Fellow, Cloud Security AllianceAs a SixSigma Black Belt I was brought up over the years with the philosophy of continual monitoring and improvement, moving from a reactive state to a preventive state. Actually, I wrote a white paper a couple of years ago o...

Are Cryptographic Keys Safe in the Cloud?

Blog Published: 03/18/2019

By Istvan Lam, CEO, TresoritBy migrating data to the cloud, businesses can enjoy scalability, ease of use, enhanced collaboration and mobility, together with significant cost savings. The cloud can be especially appealing to subject-matter experts as they no longer have to invest in building and...

Webinar: The Ever Changing Paradigm of Trust in the Cloud

Blog Published: 03/12/2019

By CSA StaffThe CSA closed its 10th annual Summit at RSA on Monday, and the consensus was that the cloud has come to dominate the technology landscape and revolutionize the market, creating a tectonic shift in accepted practice. The advent of the cloud has been a huge advancement in technology. T...

CSA Summit Recap Part 2: CSP & CISO Perspective

Blog Published: 03/12/2019

By Elisa Morrison, Marketing Intern, Cloud Security AllianceWhen CSA was started in 2009, Uber was just a German word for 'Super' and all CSA stood for was Community Supported Agriculture. Now in 2019, spending on cloud infrastructure has finally exceeded on-premises, and CSA is celebrating its 1...

CSA Summit Recap Part 1: Enterprise Perspective

Blog Published: 03/08/2019

By Elisa Morrison, Marketing Intern, Cloud Security AllianceCSA’s 10th anniversary, coupled with the bestowal of the Decade of Excellence Awards gave a sense of accomplishment to this Summit that bodes well yet also challenges the CSA community to continue its pursuit of excellence. The common th...

CCSK Success Stories: From an Information Systems Security Manager

Blog Published: 03/07/2019

By the CSA Education TeamThis is the third part in a blog series on Cloud Security Training. Today, we will be interviewing Paul McAleer. Paul is a Marine Corps veteran and currently works as an Information Systems Security Manager (ISSM) at Novetta Solutions, an advanced data analytics company h...

A Decade of Vision

Blog Published: 03/05/2019

By Jim Reavis, Co-founder and CEO, Cloud Security Alliance Developing a successful and sustainable organization is dependent upon a lot of factors: quality services, a market vision, focus, execution, timing and maybe a little luck. For Cloud Security Alliance, now celebrating our 10th&nb...

Education: A Cloud Security Investigation (CSI)

Blog Published: 03/05/2019

By Will Houcheime, Product Marketing Manager, BitglassCloud computing is now widely used in higher education. It has become an indispensable tool for both the institutions themselves and their students. This is mainly because cloud applications, such as such as G Suite and Microsoft Office 365, c...

Cloud Security Alliance Debuts Internet of Things (IoT) 
Controls Framework and Accompanying Guide

Press Release Published: 03/05/2019

Framework introduces base-level security controls required to mitigate numerous risks associated with IoT systems SAN FRANCISCO – March 4, 2019 – RSA CONFERENCE 2019– The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awareness of best practices...

Cloud Security Alliance Announces Decade of Vision Leadership Award Winners

Press Release Published: 03/04/2019

Winners have provided consistent support, mentoring and evangelism of CSA over last decadeSAN FRANCISCO – March 4,2019 – RSA CONFERENCE 2019 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure ...

Cloud Security Alliance and Internet Security Conference Sign Memorandum of Understanding

Press Release Published: 03/04/2019

CSA to hold CSASummit@ISC in conjunction with ISC event in BeijingSAN FRANCISCO – March 4, 2019 – RSA CONFERENCE 2019 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing enviro...

Cloud Security Alliance Launches STAR Continuous, a Compliance Assessment Program for Cloud Service Providers

Press Release Published: 03/04/2019

Chance to align security validation capabilities with cloud security compliance gives enterprises a competitive edge SAN FRANCISCO – March 4, 2019 – RSA CONFERENCE 2019 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awareness of best pract...

Cloud Security Alliance Debuts the Knowledge Center, a Comprehensive 
E-Learning Platform

Press Release Published: 03/04/2019

Offers individuals, enterprises high-quality flexible training to complement and enhance knowledge, schedules and budgets SAN FRANCISCO – March 4, 2019 – RSA CONFERENCE 2019 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awareness of best ...

Looking for the CCM?

Start using the Cloud Controls Matrix to simplify compliance with multiple standards & regulations.