Cloud 101CircleEventsBlog

All Articles

All Articles
STAR- A Window to the Cloud

Blog Published: 01/20/2017

By Raj Samani, Chief Technology Officer/EMEA, Intel SecurityWe are all going to live in the cloud. Well that is what every study, and forecast tells us. From our clash of clans villages, to our connected cars we can expect all of our data to be hosted in an unmarked data center in a town that we ...

People Are Not IP Addresses…So Why Do Security Solutions Think They Are?

Blog Published: 01/18/2017

By Jason Garbis, Vice President of Products, Cryptzone Attackers are erasing database contents and replacing them with a note demanding Bitcoin ransom payment for restoration. It also appears that victims who pay are often not getting their data back, and that multiple attackers are overwriting e...

Windows 10 Steps Up Ransomware Defense

Blog Published: 01/17/2017

By Jeremy Zoss, Managing Editor, Code42Here’s some good news for the countless businesses getting ready for the migration to Windows 10: Microsoft recently announced that its Windows 10 Anniversary Update features security updates specifically targeted to fight ransomware. No defense is completel...

Open Peer Review: Cloud Component Specifications Working Group Charter

Press Release Published: 01/13/2017

The Cloud Security Alliance would like to invite you to review and comment on a proposed Cloud Component Specifications Working Group Charter. The working group aims to look at security of Cloud computing at a component level - e.g. hypervisor, virtual desktop infrastructure (VDI) platforms, clou...

Open Peer Review: Cloud Security Services Management Working Group Charter

Press Release Published: 01/13/2017

The Cloud Security Alliance would like to invite you to review and comment on the proposed Cloud Security Services Management Working Group Charter. It is well acknowledged that collaboration and coordination among all stakeholders are critical to secure the cloud platform, therefore there is a ...

Securing the Converged Cloud Takes Center Stage at the Cloud Security Alliance’s Annual CSA Summit at RSA Conference 2017

Press Release Published: 01/13/2017

General Keith Alexander of IronNet Cybersecurity and Robert Herjavec of Herjavec Group to Keynote at this Year’s Event. Registration Now Open. San Francisco, CA – January 13, 2017 – RSA Conference 2017 -- The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining a...

Long Con or Domino Effect: Beware the Secondary Attack

Blog Published: 01/12/2017

By Jeremy Zoss, Managing Editor, Code42Lightning may not strike twice, but cybercrime certainly does. The latest example: A year after the major hack of the U.S. Office of Personnel Management (OPM), cyber criminals are again targeting individuals impacted by the OPM breach with ransomware attac...

Six Cloud Threat Protection Best Practices from the Trenches

Blog Published: 01/06/2017

By Ajmal Kohgadai, Product Marketing Manager, Skyhigh NetworksAs enterprises continue to migrate their on-premises IT infrastructure to the cloud, they often find that their existing threat protection solutions aren’t sufficient to consistently detect threats that arise in the cloud. While securi...

Behavox on course for Level 2 STAR Attestation from the Cloud Security Alliance

Press Release Published: 12/29/2016

Rigorous Third Party Independent Assessment To Validate Company’s Security Posture SEATTLE, WA – December 28, 2016 - The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environme...

CSA’s Big Data Working Group seeking new Co-chairs to develop and maintain Research Portfolio

Press Release Published: 12/23/2016

The Cloud Security Alliance’s Big Data Working Group is seeking new co-chairs to develop and maintain a research portfolio providing capabilities to lead the crystallization of best practices for security and privacy in big data, help industry and government on adoption of best practices, establi...

Three Lessons From the San Francisco Muni Ransomware Attack

Blog Published: 12/22/2016

By Laurie Kumerow, Consultant, Code42On Black Friday, a hacker hit San Francisco’s light rail agency with a ransomware attack. Fortunately, this story has a happy ending: the attack ended in failure. So why did it raise the hairs on the back of our collective neck? Because we fear that next time ...

Call for Participation: Contribute to CSA Security Guidance v4.0 Peer Review

Press Release Published: 12/21/2016

Closing Date: Jan 13th, 2017 The Cloud Security Alliance would like to invite you to review and comment on 12 Domains of the CSA's Security Guidance for Critical Areas of Focus in Cloud Computing. This document acts as a practical, actionable roadmap to individuals looking to safely and securely...

Adding Up the Full Cost of a Data Breach

Blog Published: 12/19/2016

By Nigel Hawthorn, Skyhigh Networks, EMEA Marketing DirectorData breaches are happening all the time; often they hit the news for a short while then they are replaced with the latest list of victims, so we thought we’d review a data breach from a year ago and look back at the total cost to the co...

Cyber Insurance Against Phishing? There’s a Catch

Blog Published: 12/15/2016

By Jeremy Zoss, Managing Editor, Code42If one of your employees gets duped into transferring money or securities in a phishing scam, don’t expect your cyber insurance policy to cover it. And even your crime policy won’t cover it unless you purchase a specific social engineering endorsement. Many ...

Standardizing Cloud Security with CSA STAR Certification

Blog Published: 12/14/2016

By Tolga Erbay, Senior Manager, Security Risk and Compliance, DropboxIn early 2014 Dropbox joined the Cloud Security Alliance (CSA). Working with the CSA is an important part of Dropbox’s commitment to security and transparency.In June of 2014 Dropbox achieved Level 1 Certification through STAR, ...

New Survey: Public Cloud Workloads

Press Release Published: 12/10/2016

Public Cloud Workloads Survey Time: 15-20 minutes Closing Date: Jan 9th, 2017 Prizes: 5 CCSK Tokens Go to Survey Abstract: Despite a wide range of commercial software applications, many enterprises still have unique requirements they fulfill with custom, internally developed applications. For ...

IBM Touts Major Mac Cost Savings; IT Professionals Still Hesitant

Blog Published: 12/09/2016

By Lance Logan, Manager/Global Marketing Program, Code42For the second year in a row, IBM’s Fletcher Previn wowed the audience at the JAMF user conference with impressive statistics on how the company’s growing Mac-based workforce is delivering dramatic and measurable business value.IBM expects M...

DevOpsSec, SecDevOps, DevSecOps: What's in a Name?

Blog Published: 12/05/2016

By Jamie Tischart, CTO Cloud/SaaS, Intel SecurityThe world is awash in DevOps, but what does that really mean? Although DevOps can mean several things to different individuals and organizations, ultimately it is about the cultural and technical changes that occur to deliver cloud services in a hi...

Insurance Carrot Beats Government Stick in Quest for Stronger Cybersecurity

Blog Published: 12/02/2016

By Laurie Kumerow, Consultant, Code42When it comes to cybersecurity, the U.S. federal government recognizes the carrot is more effective than the stick. Instead of using regulations to increase data security and protect personal information within private organizations, the White House is enlisti...

Cybersecurity in President Trump's America: The first 100 days | Katie Lewin - Federal Director of Cloud Security Alliance Weighs In

Press Release Published: 11/30/2016

It could take months to know what the Trump administration's cybersecurity policy will be. Cyber-defense experts weigh in with advice and best practices for securing your company today. November 28, 2016, 10:15 AM PST From Katie Lewin - Federal Director, Cloud Security Alliance Historically wh...

Looking for the CCM?

Start using the Cloud Controls Matrix to simplify compliance with multiple standards & regulations.