Cloud 101CircleEventsBlog

All Articles

All Articles
Observations on CSA Summit at RSA – Part 1

Blog Published: 03/15/2017

By Katie Lewin, Federal Director, Cloud Security AllianceCSA Summit at RSA was a day-long session on Securing the Converged Cloud organized around presentations and panels from leading vendors such as Centrify, Veracode, Microsoft, and Netskope, as well as a talk on “Effective Cybersecurity” by R...

Preparing for the Quantum Future: Setting Global Security Standards to Make Us Quantum-Safe

Blog Published: 03/13/2017

By Frank Guanco, Quantum-Safe Security Working Group, Cloud Security AllianceRecently there has been an increase in the perceived threat of the quantum computer to modern cryptographic standards in widespread use. During the last year, security agencies such as the United States Government Nation...

Call for Participation: SaaS Governance Working Group

Press Release Published: 03/13/2017

The Cloud Security Alliance would like to invite you to participate in the SaaS Governance Working Group. The SaaS Governance working group aims to benefit all parties in the Software-as-a-Service (SaaS) ecosystem by supporting a common understanding of SaaS related risks from the perspectives of...

Market & Technology Readiness (MTRLs)

Blog Published: 03/09/2017

By Frank Khan Sullivan, Vice President/Marketing, Strategic BlueThere is a need to communicate a project’s maturity to a non-technical audience. The Market & Technology Readiness Level Framework [PDF] aims to provide decision makers with a holistic view of a project’s maturity in a simple way...

Prepare for Windows 10 Migration the Gartner Way

Blog Published: 03/08/2017

By Jeremy Zoss, Managing Editor, Code42It’s 2017, which means there’s a good chance your company is preparing to migrate to Windows 10. The operating system may have launched back in 2015, but this is the year that Gartner predicts enterprise adoption of the operating system will truly take off, ...

Searching for Blockchain Co-Chair

Press Release Published: 02/27/2017

CSA is searching for another co-chair to help lead the Blockchain / Distributed Ledger working group who is preferably from the financial side. Being a co-chair of the work group presents great opportunities such as networking and interacting closely with volunteers representing some of the top m...

Is Your Industry at High Risk of Insider Threat?

Blog Published: 02/24/2017

By Jeremy Zoss, Managing Editor, Code42In the movies, data theft is usually the work of outsiders. You’ve witnessed the scene a million times: A cyber thief breaks into a business, avoiding security measures, dodging guards and employees, and making off with a USB stick of valuable data seconds b...

The Rise in SSL-based Threats

Blog Published: 02/23/2017

By Derek Gooley, Security Researcher, ZscalerOverviewThe majority of Internet traffic is now encrypted. With the advent of free SSL providers like Let’s Encrypt, the move to encryption has become easy and free. On any given day in the Zscaler cloud, more than half of the traffic that inspected us...

The Growth of Macs in the Enterprise Is Challenging the PC’s Dominance

Blog Published: 02/22/2017

By Jeremy Zoss, Managing Editor, Code42The PC has long been the default choice for business computers, but perhaps not for much longer. The growth of Macs in the enterprise has been exponential in recent years, as illustrated by the infographic below.For context on why Macs are growing in popular...

Avoid the Heartbreak of Insider Threat

Blog Published: 02/14/2017

By Ashley Jarosch, Manager/Marketing Programs, Code42While everyone else is celebrating love and romance this Valentine’s Day, here at Code42 we’re reflecting on heartbreak—specifically, the heartbreak of insider threat.The Heartbreak and Betrayal of Insider ThreatIt’s a feeling anyone in the ent...

The New CSA Consultancy Program Will Ensure Best Practices in Secure Cloud Implementation

Blog Published: 02/13/2017

By Daniele Catteddu, Chief Technology Officer, CSAAs increasing numbers of enterprises begin the move to the cloud in earnest, there has simultaneously developed a host of third-party consultancy firms, offering guidance on cloud technology best practices and implementation. Recognizing that ther...

Cloud Security Alliance Establishes New Third-Party Consultancy Program to Ensure Best Practices in Secure Cloud Implementation

Press Release Published: 02/13/2017

CSA Names Optiv As First Certified Provider for New Program SAN FRANCISCO, CA – February 13, 2017 – RSA Conference 2017 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing envi...

Cloud Security Alliance Releases New Software Defined Perimeter for Infrastructure-as-a-Service Research

Press Release Published: 02/13/2017

New Report Outlines How SDP Can Be Applied to Infrastructure-as-a-Service Environments, Including Requirements, Benefits and Key Use Cases SAN FRANCISCO, CA – February 13, 2017 – RSA Conference 2017 - The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and r...

New Security Research – the Software-Defined Perimeter for the Cloud

Blog Published: 02/13/2017

By Jason Garbis, Vice President of Products, CryptzoneOn behalf of the Cloud Security Alliance, I’m pleased to announce the publication of our newest security research from the Software Defined Perimeter (SDP) Working Group, exploring how the SDP can be applied to Infrastructure-as-a-Service envi...

Cloud Security Alliance Announces General Availability of STARWatch Cloud Security Management Application

Press Release Published: 02/13/2017

Compliance Management SaaS Application Formally Launches Boasting More than 250 Active Users SAN FRANCISCO – February 13, 2017 – RSA Conference 2017 - The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure ...

3-2-1, Takeoff. The STARWatch Cloud Security Management Application Has Launched

Blog Published: 02/13/2017

By Daniele Catteddu, Chief Technology Officer, Cloud Security AllianceCompliance, assurance and vendor management are becoming more and more complex and resource-intensive issues, so we created STARWatch, a Software as a Service (SaaS) application designed to provide organizations a centralized w...

On Data Privacy Day, Keep Your Data Safe by Identifying the Threats

Blog Published: 01/30/2017

By Rick Orloff, Chief Security Officer, Code42Saturday, January 28th was Data Privacy Day. We’re proud champions of the National Cyber Security Alliance’s focused effort on protecting privacy and safeguarding data. But at Code42, we know that one day isn’t enough. We dedicate an entire month each...

Reviewers Needed: Security Guidance for Critical Areas of Mobile Computing

Press Release Published: 01/25/2017

Dear Colleagues, The Mobile Working Group is updating the document entitled "Security Guidance for Critical Areas of Mobile Computing" last published in 2012. To streamline the updating process, we are opening a peer review of the 2012 document. We are looking for SMEs to provide feedback on the...

CSA’s Mobile Working Group Seeking New Co-Chair

Press Release Published: 01/25/2017

The Cloud Security Alliance’s Mobile Working Group is seeking new co-chairs to develop and maintain a research portfolio providing capabilities to lead the crystallization of best practices for mobile security, help industry and government on adoption of best practices, establish liaisons with ot...

CSA releases Quantum-Safe Security Glossary

Blog Published: 01/25/2017

The Cloud Security Alliance's Quantum-Safe Security (QSS) Working Group announces their latest release with the Quantum-Safe Security Glossary. The QSS Working Group was formed to address key generation and transmission methods and to help the industry understand quantum-safe methods for protecti...

Looking for the CCM?

Start using the Cloud Controls Matrix to simplify compliance with multiple standards & regulations.