Cloud 101CircleEventsBlog

All Articles

All Articles
Security Needs Vs. Business Strategy – Finding a Common Ground

Blog Published: 08/21/2017

By Yael Nishry, Vice President of Business Development, VaultiveEven before cloud adoption became mainstream, it wasn’t uncommon for IT security needs to conflict with both business strategy and end user preferences. Almost everyone with a background in security has found themselves in the awkwar...

Ransomware Explained

Blog Published: 08/18/2017

By Ryan Hunt, PR and Content Manager, SingleHopHow it Works — Plus Tips for Prevention & Recovery Ransomware attacks — a type of malware (a.ka. malicious software) — are proliferating around the globe at a blistering pace. In Q1 2017, a new specimen emerged every 4.2 seconds!* What makes ra...

Is the Cloud Moving Too Fast for Security?

Blog Published: 07/28/2017

By Doug Lane, Vice President/Product Marketing, VaultiveIn February 2017, a vulnerability in Slack was discovered which had the potential to expose the data of the company’s reported four million daily active users. Another breach in February on CloudFlare, a content delivery network, leaked sens...

Cloud Security Alliance Announces Upcoming Launch of CCSK v4

Press Release Published: 07/27/2017

Updates to industry leading cloud certificate reflect evolving cloud landscape and the need for qualified security professionals. LAS VEGAS, NV – Black Hat 2017, Booth BB5 – July 26, 2017 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awar...

Guidance for Critical Areas of Focus in Cloud Computing Has Been Updated

Blog Published: 07/26/2017

Newest version reflects real-world security practices, future of cloud computing securityBy J.R. Santos, Executive Vice President of Research, Cloud Security AllianceToday marks a momentous day not only for CSA but for all IT and information security professionals as we release Guidance for Criti...

Cloud Security Alliance Announces Major Updates to Guidance v4.0

Press Release Published: 07/26/2017

Domains Restructured and Rewritten to Better Represent the Current State and Future of Cloud Computing Security LAS VEGAS, NV – Blackhat 2017 – July 26, 2017 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awareness of best practices to hel...

The Inaugural Philippines Summit attracts over 700 attendees

Press Release Published: 07/25/2017

At the Inaugural Cloud Security Alliance (CSA) Philippines Summit held on 11 July 2017, twenty-seven leading IT companies and start-ups demonstrated innovations across sectors of Cloud technology including Security, Datacenter, Enterprise, Mobile Apps, and E-Commerce. The CSA PH Summit was held ...

Patch Me If You Can

Blog Published: 07/24/2017

By Yogi Chandiramani, Technical Director/EMEA, ZscalerIn May, the worldwide WannaCry attack infected more than 200,000 workstations. A month later, just as organizations were regaining their footing, we saw another ransomware attack, which impacted businesses in more than 65 countries.What have w...

Cyberattacks Are Here: Security Lessons from Jon Snow, White Walkers & Others from Game of Thrones

Blog Published: 07/19/2017

An analysis of Game of Thrones characters as cyber threats to your enterprise.By Virginia Satrom, Senior Public Relations Specialist, ForcepointAs most of you have probably seen, we recently announced our new human point brand campaign. Put simply, we are leading the way in making security not ju...

CSA Industry Blog Listed Among 100 Top Information Security Blogs for Data Security

Blog Published: 07/10/2017

Our blog was recently ranked 35th among 100 top information security blogs for data security professionals by Feedspot. Among the other blogs named to the list were The Hacker News, Krebs on Security and Dark Reading. Needless to say, we're honored to be in such good company. To be listed, Fee...

Locking-in the Cloud: Seven Best Practices for AWS

Blog Published: 07/06/2017

By Sekhar Sarukkai, Co-founder and Chief Scientist, Skyhigh Networks With the voter information of 198 million Americans exposed to the public, the Deep Root Analytics leak brought cloud security to the forefront. The voter data was stored in an AWS S3 bucket with minimal protection. In fact, the...

Clouding Within the Lines: Keeping User Data Where It Belongs in the Age of GDPR

Blog Published: 07/03/2017

By Nathan Narayanan, Director of Product Management, NetskopeImportance around data residency hygiene has been around for a long time, but cloud services that often show up tend to focus more on user productivity and less on user data privacy. The highly-productive nature of these services increa...

Crank Up Your Cloud Security Knowledge with These Upcoming Webinars

Blog Published: 06/12/2017

By Hillary Barron, Research Analyst and CloudBytes Program Manager, Cloud Security AllianceWhether you’re trying to make the move to cloud while managing an outdated endpoint backup, attempting to figure out how to overcome the challenges pertaining to developing and deploying security automation...

Who Touched My Data?

Blog Published: 06/09/2017

You don’t know what you don’t knowBy Yael Nishry, Vice President of Business Development, Vaultive, and Arthur van der Wees, Founder and Managing Director, Arthur's LegalRansomwareIT teams generally use encryption to enable better security and data protection. However, in the hands of malicious p...

My Second Attempt at Explaining Blockchain to My Wife

Blog Published: 06/07/2017

I tried explaining blockchain to my wife and here’s what happened...By Antony Ma, CTO/PowerData2Go, Founding Chairman/CSA Hong Kong and Macau Chapter, and Board Member/CSA Singapore ChapterI introduced my wife to Python around nine months ago, and now she’s tinkering and has drawn a tortoise on h...

Cloud Security Alliance Announces “Grand Opening” of Its New Third-Party Global Consultancy Program

Press Release Published: 06/05/2017

Selected Inaugural Providers BH Consulting, KPMG, Optiv and Securosis Ready to Help Organizations Ensure Secure Cloud Implementation Best Practices SEATTLE, WA – June 5, 2017 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awareness of best...

Office 365 Deployment: Research Suggests Companies Need to “Think Different”

Blog Published: 06/02/2017

Survey shows what companies expected and what they found outBy Atri Chatterjee, Chief Marketing Officer, ZscalerIt’s been six years since Microsoft introduced Office 365, the cloud version of the most widely used productivity software suite. In those years, Office 365 has earned its place as the ...

Want To Empower Remote Workers? Focus On Their Data

Blog Published: 05/31/2017

By Jeremy Zoss, Managing Editor, Code42Here’s a nightmare scenario for IT professionals: Your CFO is working from the road on a high-profile, highly time sensitive business deal. Working late on documentation for the deal, a spilled glass of water threatens everything. His laptop is fried; all fi...

New CSA Report Offers Observations, Recommendations on Connected Vehicle Security

Blog Published: 05/25/2017

By John Yeoh, Research Director/Americas, Cloud Security AllianceConnected Vehicles are in the news for introducing new features and capabilities to the modern automobile. Headlines also highlight security hacks that compromise vehicle operations and usability. While sources note that the vulnera...

Cloud Security Alliance Releases New Guidance for Connected Vehicle Security

Press Release Published: 05/25/2017

New Report from Internet of Things (IoT) Working Group Identifies Vehicle Attack Vectors and Impacts, Provides Recommendations for Securing the Connected Vehicle Environment SEATTLE, WA – May 25, 2017 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and...

Looking for the CCM?

Start using the Cloud Controls Matrix to simplify compliance with multiple standards & regulations.