Cloud 101CircleEventsBlog
Master CSA’s Security, Trust, Assurance, and Risk program—download the STAR Prep Kit for essential tools to enhance your assurance!

All Articles

All Articles
EMV Chip Cards Are Working - That's Good and Bad

Blog Published: 02/02/2018

By Rich Campagna, CEO, BitglassFor many years, credit card companies and retailers ruled the news headlines as victims of breaches. Why? Hackers' profit motives lead them to credit card numbers as the quickest path to monetization. Appropriate data in hand and a working counterfeit card could be ...

Saturday Security Spotlight: Cyberwarfare and Cryptocurrency

Blog Published: 01/29/2018

By Jacob Serpa, Product Marketing Manager, Bitglass Here are the top cybersecurity stories of recent weeks: —Cyberattacks deemed a top threat to society —Hackers target data around the world —Poor app designs threaten countries' infrastructure —Olympic Committee emails leaked by hackers ...

Cloud Security Alliance Releases Quantum-Safe Security Awareness Survey Report

Press Release Published: 01/26/2018

Newest paper finds that despite awareness of threat posed by quantum computing, little is being done to prepare SEATTLE, WA – January 26, 2018 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secu...

Nine Myths of Account Takeover

Blog Published: 01/25/2018

By Dylan Press, Director of Marketing, AvananAccount takeover attacks are a nearly invisible tactic for conducting cyber espionage. Because these breaches can take months or years to detect, we are slowly discovering that this attack vector is much more common than we thought. The more we learn a...

Cloud App Encryption and CASB

Blog Published: 01/19/2018

By Kyle Watson, Partner/Information Security, Cedrus DigitalMany organizations are implementing Cloud Access Security Broker (CASB) technology to protect critical corporate data stored within cloud apps. Amongst many other preventative and detective controls, a key feature of CASBs is the ability...

Saturday Morning Security Spotlight: Breaches and Intel

Blog Published: 01/15/2018

By Jacob Serpa, Product Marketing Manager, BitglassHere are the top cybersecurity stories of recent weeks: —Data on 123 million US households leaked —Tech giants investing in healthcare technology —Intel chips contain security vulnerability —DHS suffers breach of over 247,000 records —Forever 21...

Your Top Three Cloud Security Resolutions for 2018 Categories: Blog, Cloud Security

Blog Published: 01/11/2018

By Doug Lane, Vice President/Product Marketing, VaultiveWith 2017 behind us, it’s time to prepare your IT strategy and goals for the new year. There is a good chance that, if you aren’t using the cloud already, there’s a cloud services migration in store for your organization this year. No matte...

Cloud Access Security Brokers: Past, Present, and Future

Blog Published: 01/09/2018

By Jacob Serpa, Product Marketing Manager, BitglassLeading cloud access security brokers (CASBs) currently provide data protection, threat protection, identity management, and visibility. However, this has not always been the case. Since the inception of the CASB market, cloud access security br...

Launching of Application Containers and Microservices

Press Release Published: 01/05/2018

The Cloud Security Alliance is launching the Application Containers and Microservices (ACM) Working Group. The CSA ACM Working Group previously work with the National Institute of Standards and Technology (NIST) ACM Working Group to provide research, guidance, and best practices for the secure us...

The Stakes for Protecting Personally Identifiable Information Will Be Higher in 2018

Blog Published: 01/04/2018

By Doug Lane, Vice President/Product Marketing, VaultiveWhile it’s tough to predict what the most significant single threat of 2018 will be, it’s safe to say that 2017 was certainly a wake-up call for both businesses and consumers when it comes to data breaches. From the rampant misconfiguration...

Saturday Morning Security Spotlight: Jail Breaks and Cyberattacks

Blog Published: 12/29/2017

By Jacob Serpa, Product Marketing Manager, BitglassHere are the top cybersecurity stories of recent weeks:— Man attempts prison break through cyberattacks— Mailsploit allows for perfect phishing attacks— 1.4 billion credentials found in dark web database— Starbucks WiFi hijacks connected devices—...

Adding Value to Native Cloud Application Security with CASB

Blog Published: 12/27/2017

By Paul Ilechko, Senior Security Architect, CedrusMany companies are starting to look at the Cloud Access Security Broker (CASB) technology as an extra layer of protection for critical corporate data as more and more business processes move to the cloud.CASB technologies protect critical corporat...

It Could Happen To You

Blog Published: 12/20/2017

By Yael Nishry, Vice President/Business Development, Vaultive; Arthur van der Wees LLM, Arthur’s Legal; and Jiri Svorc LLM, Arthur’s LegalFor organizations around the world, implementing state-of-the-art security and personal data protection (using both technical and organizational measures) is ...

Avoid a Breach: Five Tips to Secure Data Access

Blog Published: 12/18/2017

By Jacob Serpa, Product Marketing Manager, BitglassAlthough the cloud is a boon to productivity, flexibility, and cost savings, it can also be a confusing tool to utilize properly. When organizations misunderstand how to use it, they often expose themselves to threats. While there aren’t necessar...

MSP: Is Your New Digital Service Compliant?

Blog Published: 12/15/2017

By Eitan Bremler, VP Marketing and Product Management, Safe-T DataOffering managed services seems like an easy proposition. You offer IT services for companies that don't have the infrastructure to support their own, bundle in services like cloud storage or remote desktop access, then sit back an...

Decoding NYCRR Part 500: What Finance Institutions Need to Know

Blog Published: 12/13/2017

By Kyle Watson, Identity and Access Management and Cloud Access Security Broker Expert, CedrusFor those of you in organizations subject to NYDFS oversight, you are probably aware of 23 NYCRR 500, a new set of cybersecurity requirements that went into effect this past March for financial services ...

AWS Cloud: Proactive Security and Forensic Readiness – Part 1

Blog Published: 12/11/2017

By Neha Thethi, Information Security Analyst, BH Consulting Part 1 – Identity and Access Management in AWS This is the first in a five-part blog series that provides a checklist for proactive security and forensic readiness in the AWS cloud environment. This post relates to identity and access ma...

What Will Software Defined Perimeter Mean for Compliance?

Blog Published: 12/08/2017

By Eitan Bremler, VP Marketing and Product Management, Safe-T DataYour network isn't really your network anymore. More specifically, the things you thought of as your network — the boxes with blinking lights, the antennae, the switches, the miles of Cat 5 cable — no longer represent the physical ...

Your Morning Security Spotlight: Apple, Breaches, and Leaks

Blog Published: 12/07/2017

By Jacob Serpa, Product Marketing Manager, BitglassHere are the top cybersecurity stories of recent weeks:–Apple's High Sierra has massive vulnerability–Survey says all firms suffered a mobile cyberattack–Morrisons liable for ex-employee leaking data–S3 misconfiguration leaks NCF customer data–Im...

Electrify Your Digital Transformation with the Cloud

Blog Published: 12/05/2017

By Tori Ballantine, Product Marketing, HylandTaking your organization on a digital transformation journey isn’t just a whimsical idea; or something fun to daydream about; or an initiative that “other” companies probably have time to implement. It’s something that every organization needs to serio...

Looking for the CCM?

Start using the Cloud Controls Matrix to simplify compliance with multiple standards & regulations.