Cloud 101CircleEventsBlog

All Articles

All Articles
Spotlight on Enterprise Grade Cloud Security at Cloud Security Alliance’s Annual CSA Summit at RSA Conference 2018

Press Release Published: 02/12/2018

Chief Executives from Leading Global Companies Talk Cloud as the New Dominant IT System; Registration Now Open San Francisco, CA – February 7, 2018 – RSA Conference 2018 -- The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awareness of best pra...

Cloud Security Alliance Issues State of ERP Security in the Cloud Report

Press Release Published: 02/12/2018

Newest research paper examines security, privacy challenges of migrating ERP systems to the cloud SEATTLE, WA – February 12 - 2018 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud c...

Volunteers Needed: Blockchain/Distributed Ledger Working Group

Press Release Published: 02/12/2018

The CSA Blockchain and Distributed Ledger Working Group is searching for volunteers to participate in the development of whitepapers on blockchain use cases and guidance for implementing blockchain technology. The working group is looking for volunteers who have expertise in the financial sector ...

Saturday Security Spotlight: Military, Apps, and Threats

Blog Published: 02/12/2018

By Jacob Serpa, Marketing Manager, BitglassHere are the top cybersecurity stories of recent weeks:—Fitness app exposes military bases—Soldiers' names revealed by app—Google Play filled with fake apps—Medical devices easily hacked—The internet of things creates risk for the enterprise Fitness app...

Why Next-Gen Firewalls Can't Replace CASBs

Blog Published: 02/07/2018

By Joe Green, Vice President, /WW Solutions Engineering, Bitglass A security solution is only as good as the data it protects. Some solutions focus on data protection on the corporate network, others focus entirely on cloud data, and a select few enable security at access from any network. Next-...

EMV Chip Cards Are Working - That's Good and Bad

Blog Published: 02/02/2018

By Rich Campagna, CEO, BitglassFor many years, credit card companies and retailers ruled the news headlines as victims of breaches. Why? Hackers' profit motives lead them to credit card numbers as the quickest path to monetization. Appropriate data in hand and a working counterfeit card could be ...

Saturday Security Spotlight: Cyberwarfare and Cryptocurrency

Blog Published: 01/29/2018

By Jacob Serpa, Product Marketing Manager, Bitglass Here are the top cybersecurity stories of recent weeks: —Cyberattacks deemed a top threat to society —Hackers target data around the world —Poor app designs threaten countries' infrastructure —Olympic Committee emails leaked by hackers ...

Cloud Security Alliance Releases Quantum-Safe Security Awareness Survey Report

Press Release Published: 01/26/2018

Newest paper finds that despite awareness of threat posed by quantum computing, little is being done to prepare SEATTLE, WA – January 26, 2018 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secu...

Nine Myths of Account Takeover

Blog Published: 01/25/2018

By Dylan Press, Director of Marketing, AvananAccount takeover attacks are a nearly invisible tactic for conducting cyber espionage. Because these breaches can take months or years to detect, we are slowly discovering that this attack vector is much more common than we thought. The more we learn a...

Cloud App Encryption and CASB

Blog Published: 01/19/2018

By Kyle Watson, Partner/Information Security, Cedrus DigitalMany organizations are implementing Cloud Access Security Broker (CASB) technology to protect critical corporate data stored within cloud apps. Amongst many other preventative and detective controls, a key feature of CASBs is the ability...

Saturday Morning Security Spotlight: Breaches and Intel

Blog Published: 01/15/2018

By Jacob Serpa, Product Marketing Manager, BitglassHere are the top cybersecurity stories of recent weeks: —Data on 123 million US households leaked —Tech giants investing in healthcare technology —Intel chips contain security vulnerability —DHS suffers breach of over 247,000 records —Forever 21...

Your Top Three Cloud Security Resolutions for 2018 Categories: Blog, Cloud Security

Blog Published: 01/11/2018

By Doug Lane, Vice President/Product Marketing, VaultiveWith 2017 behind us, it’s time to prepare your IT strategy and goals for the new year. There is a good chance that, if you aren’t using the cloud already, there’s a cloud services migration in store for your organization this year. No matte...

Cloud Access Security Brokers: Past, Present, and Future

Blog Published: 01/09/2018

By Jacob Serpa, Product Marketing Manager, BitglassLeading cloud access security brokers (CASBs) currently provide data protection, threat protection, identity management, and visibility. However, this has not always been the case. Since the inception of the CASB market, cloud access security br...

Launching of Application Containers and Microservices

Press Release Published: 01/05/2018

The Cloud Security Alliance is launching the Application Containers and Microservices (ACM) Working Group. The CSA ACM Working Group previously work with the National Institute of Standards and Technology (NIST) ACM Working Group to provide research, guidance, and best practices for the secure us...

The Stakes for Protecting Personally Identifiable Information Will Be Higher in 2018

Blog Published: 01/04/2018

By Doug Lane, Vice President/Product Marketing, VaultiveWhile it’s tough to predict what the most significant single threat of 2018 will be, it’s safe to say that 2017 was certainly a wake-up call for both businesses and consumers when it comes to data breaches. From the rampant misconfiguration...

Saturday Morning Security Spotlight: Jail Breaks and Cyberattacks

Blog Published: 12/29/2017

By Jacob Serpa, Product Marketing Manager, BitglassHere are the top cybersecurity stories of recent weeks:— Man attempts prison break through cyberattacks— Mailsploit allows for perfect phishing attacks— 1.4 billion credentials found in dark web database— Starbucks WiFi hijacks connected devices—...

Adding Value to Native Cloud Application Security with CASB

Blog Published: 12/27/2017

By Paul Ilechko, Senior Security Architect, CedrusMany companies are starting to look at the Cloud Access Security Broker (CASB) technology as an extra layer of protection for critical corporate data as more and more business processes move to the cloud.CASB technologies protect critical corporat...

It Could Happen To You

Blog Published: 12/20/2017

By Yael Nishry, Vice President/Business Development, Vaultive; Arthur van der Wees LLM, Arthur’s Legal; and Jiri Svorc LLM, Arthur’s LegalFor organizations around the world, implementing state-of-the-art security and personal data protection (using both technical and organizational measures) is ...

Avoid a Breach: Five Tips to Secure Data Access

Blog Published: 12/18/2017

By Jacob Serpa, Product Marketing Manager, BitglassAlthough the cloud is a boon to productivity, flexibility, and cost savings, it can also be a confusing tool to utilize properly. When organizations misunderstand how to use it, they often expose themselves to threats. While there aren’t necessar...

MSP: Is Your New Digital Service Compliant?

Blog Published: 12/15/2017

By Eitan Bremler, VP Marketing and Product Management, Safe-T DataOffering managed services seems like an easy proposition. You offer IT services for companies that don't have the infrastructure to support their own, bundle in services like cloud storage or remote desktop access, then sit back an...

Looking for the CCM?

Start using the Cloud Controls Matrix to simplify compliance with multiple standards & regulations.