Cloud 101CircleEventsBlog

All Articles

All Articles
One Day Is a Lifetime in Container Years

Blog Published: 11/30/2016

By Jon King, Security Technologist and Principal Engineer, Intel Security Securing virtual assets that appear and disappear. The average life span of a container is short and getting shorter. While some organizations use containers as replacements for virtual machines, many are using them increas...

Out of the Shadows

Blog Published: 11/23/2016

By Patty Hatter, Vice President and General Manager, Intel Security Group Professional ServicesHow to Bring Cloud Usage into the LightOn any given day – with a quick spot-check – you’ll probably find that up to half of your company’s IT usage is basically hidden in the shadows of various business...

Cloud Security Alliance Releases Report on State of Cloud Adoption in India

Press Release Published: 11/23/2016

Findings Come on the Heels of Successful CSA APAC Congress in Bengaluru Bengaluru, India – November 22, 2016 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment, su...

Evolving Threats Compel an About-face in Data Protection Strategy

Blog Published: 11/21/2016

By Vijay Ramanathan, Vice President of Product Management, Code42It’s time to flip our thinking about enterprise information security. For a long time, the starting point of our tech stacks has been the network. We employ a whole series of solutions on servers and networks—from monitoring and al...

Container Sprawl: The Next Great Security Challenge

Blog Published: 11/18/2016

By Jon King, Security Technologist and Principal Engineer, Intel SecurityAnd you thought virtualization was tough on security …Containers, the younger and smaller siblings of virtualization, are more active and growing faster than a litter of puppies. Recent stats for one vendor show containers n...

Cloud Security Alliance Launches Crowdfunded Cloud Security Management Solution

Press Release Published: 11/15/2016

STARWatch SaaS Application Empowers Organizations to Manage Compliance & Risks Using CSA Standards and Best Practices SAN FRANCISCO - November 15, 2016 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awareness of best practices to help ...

Fight Against Ransomware Takes to the Cloud

Blog Published: 11/14/2016

By Raj Samani, EMEA CTO, Intel Security“How many visitors do you expect to access the No More Ransom Portal?”This was the simple question asked prior to this law enforcement (Europol’s European Cybercrime Centre, Dutch Police) and private industry (Kaspersky Lab, Intel Security) portal going live...

Personalized Ransomware: Price Set by Your Ability to Pay

Blog Published: 11/11/2016

By Susan RichardsonSmart entrepreneurs have long employed differential pricing strategies to get more money from customers they think will pay a higher price. Cyber criminals have been doing the same thing on a small scale with ransomware: demanding a larger ransom from individuals or companies f...

Cyber Security Tip for CISOs: Beware of Security Fatigue

Blog Published: 11/04/2016

By Susan Richardson, Manager/Content Strategy, Code42What’s the most effective thing you can do for cyber security awareness? Stop talking about it, according to a new study that uncovered serious security fatigue among consumers. The National Institute of Standards and Technology study, publishe...

CSA'S IOT SECURITY REPORT

Press Release Published: 11/03/2016

OCTOBER 28, 2016 via RESEARCHandMARKETS, The World's Largest Market Research Store Last week’s DDoS attack was the largest of its kind in history, and shows how easy Internet of Things devices can be compromised and used to conduct massive cyber-attacks. The attack has caused serious concern am...

The Dyn Outage and Mirai Botnet: Using Yesterday's Vulnerabilities to Attack Tomorrow's Devices Today

Blog Published: 11/02/2016

By Jacob Ansari, Manager, SchellmanOn Oct. 21, Dyn, a provider of domain name services (DNS), an essential function of the Internet that translates names like www.schellmanco.com to its numerical IP address, went offline after a significant distributed denial of service (DDoS) attack affected Dyn...

Cloud Security Alliance Releases Chinese Financial Services Report with Ernst & Young China

Press Release Published: 11/02/2016

Beijing, CHINA – November 1, 2016 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment, and Ernst & Young (EY) China, today released the results of a joint survey...

To Include or Not to Include – Scoping ISO 27001 and Colocation Service Providers

Blog Published: 10/31/2016

By Ryan Mackie, Principal and ISO Certification Services Practice Director, SchellmanIntroductionISO 27001 North American GrowthISO/IEC 27001:2015 (ISO 27001) certification is becoming more of a conversation in most major businesses in the United States. To provide some depth, there was a 20% inc...

Defeating Insider Threats in the Cloud

Blog Published: 10/27/2016

By Evelyn de Souza, Data Privacy and Security Leader, Cisco Systems and Strategy Advisor, Cloud Security Alliance Everything we know about defeating the insider threat seems to not be solving the problem. In fact, evidence from the Deep, Dark and Open Web points to a greatly worsening problem....

Everything You've Ever Posted Becomes Public from Tomorrow

Blog Published: 10/26/2016

By Avani Desai, Executive Vice President, Schellman & Co. As I sit here, ironically just wrapping up a privacy conference, scrolling my Facebook wall, I am seeing dozens of posts from smart, professional, aware people, all posting an apparent disclaimer to Facebook in an attempt...

Five Prevention Tips and One Antidote for Ransomware

Blog Published: 10/25/2016

By Susan Richardson, Manager/Content Strategy, Code42During National Cyber Security Awareness Month, understanding the ins and outs of ransomware seems particularly important—given the scandalous growth of this malware. In this webinar on ransomware hosted by SC Magazine, guest speaker John Kinde...

Happy Birthday to… Wait, Who’s This Guy?

Blog Published: 10/11/2016

By Jacob Ansari, Manager, SchellmanHow many arbitrary people do you have to get into a room before two of them share the same birthday? Probability theory has considered this problem for so long that no one is quite certain who first posed the so-called “birthday problem” or “birthday paradox.” W...

Minister Denis Naughten to Address EU Security Directive at (ISC)2 Security Congress EMEA

Blog Published: 10/11/2016

Denis Naughten will address (ISC)2 Security Congress EMEA delegates on the latest developments in Ireland’s National Cyber Security Strategy since its launch in 2015, including the requirement to transpose the European Union Security of Network and Information Systems Directive (2016/1148) into n...

CSA Internet of Things Working Group Releases Industry’s First Guidance for Securing IoT Product Ecosystem

Press Release Published: 10/07/2016

‘Designing and Developing Secure IoT Products’ Provides Actionable and Useful Guidance to Raise the Overall Security of IoT Products San Jose, CA – CSA Congress 2016 – October 7, 2016 – The Cloud Security Alliance (CSA) today released a new detailed and hefty guidance report titled Future-proofi...

Cloud Security Alliance EMEA to Host Fifth Annual Congress

Press Release Published: 10/07/2016

Agenda and Keynote Speakers Announced for Premiere European Cloud Security Event MADRID, SPAIN – October 7, 2016 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment...

Looking for the CCM?

Start using the Cloud Controls Matrix to simplify compliance with multiple standards & regulations.