Cloud 101CircleEventsBlog

All Articles

All Articles
HIPAA Violations Examples and Cases – Eight Cautionary Tales

Blog Published: 10/06/2016

By Ajmal Kohgadai, Product Marketing Manager, Skyhigh NetworksThe Health Insurance Portability and Accountability Act (HIPAA) helps protect patient privacy by requiring healthcare organizations and their business associates to protect sensitive data — including how the data is used and disclosed....

Cloud Security Alliance Asia Pacific Hosts Financial Cloud Forum in Shanghai

Press Release Published: 10/05/2016

Organization Announces Upcoming Research and Future Events in Region Shanghai, China – October 6, 2016 -- The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment, today o...

Ransomware: Just Say No to Stronger Scare Tactics

Blog Published: 10/04/2016

By Susan Richardson, Manager/Content Strategy, Code42Ah, those ingenious cyber criminals. They keep coming up with ever more frightening ransomware threats. JIGSAW warns victims it will delete files every hour until they pay $150 USD in bitcoins. Chimera threatens to publish the victim’s files on...

Open Peer Review - Quantum-Safe Security Glossary

Press Release Published: 09/27/2016

The Cloud Security Alliance would like to invite you to review and comment on the Quantum-Safe Security working group's latest document, Quantum-Safe Security Glossary. This document is the latest in a series of documents from the working group introducing quantum computing. This document is inte...

Open Peer Review - Applied Quantum-Safe Security: Quantum Resistant Algorithms and Quantum Key Distribution position paper

Press Release Published: 09/27/2016

The Cloud Security Alliance would like to invite you to review and comment on the Quantum-Safe Security working group's latest document, Applied Quantum-Safe Security: Quantum Resistant Algorithms and Quantum Key Distribution. This document is the latest in a series of documents from the working ...

ReadITQuick Interview with Executive Vice President of Research at CSA - Luciano Santos

Press Release Published: 09/23/2016

ReadITQuick interview by Meghna Lal, September 21, 2016, with Luciano Santos, Executive Vice President of Research at Cloud Security Alliance. Full Interview at ReadITQuik.com

Ran$umBin: Disruptive Innovation for the Black Market

Blog Published: 09/22/2016

By Susan Richardson, Manager/Content Strategy, Code42Sometimes the ingenuity of the free market is truly remarkable. And in the case of the new black market for ransomed data, remarkably scary. One of the latest triumphs of the entrepreneurial spirit is Ran$umBin, a sort of eBay for ransomers—or ...

Cloud Security Alliance Announces Annual Ron Knode Service Award Recipients

Press Release Published: 09/15/2016

Contributions from Six Dedicated Individual CSA Volunteers Recognized in Honor of the Late CSA Member and Volunteer Contributor Ron Knode SAN JOSE, CA – CSA Congress US – September 15, 2016 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising aw...

EFSS Spreads Ransomware; Endpoint Backup Guarantees Recovery

Blog Published: 09/14/2016

By Kyle Hatlestad, Principal Architect, Code42One of the objections I’m hearing more and more is, “Why do I need backup when I have Microsoft OneDrive for Business (or Google Drive, Box or Dropbox for Business)?” On the surface, it may seem like endpoint backup isn’t needed because with an enterp...

Eight Questions to Ask When Evaluating a CASB

Blog Published: 09/12/2016

By Rich Campagna, Vice President/Products & Marketing, Bitglass Cloud Access Security Brokers are the hottest technology in enterprise security right now, topping Gartner's Top 10 list two years running. Widespread adoption of major cloud apps like Office 365 (and corresponding cloud security...

Data Privacy Survey: First 50 respondents get $20 Amazon gift cards – 300+ participants needed

Press Release Published: 09/09/2016

Data Privacy and Digital Transformation Survey Prizes: $20 Amazon Gift Cards for the first 50 respondents, Ring Video Doorbell, 10 CCSK Tokens Time: 10 minutes Abstract: Cloud-based technologies are driving digital transformation, but new data privacy regulations are hampering adoption. We’d l...

Cybersecurity: “Change or Die”

Blog Published: 09/09/2016

By Paul B. Kurtz, CEO TruSTAR Technology and Member of Board of Directors, Cloud Security Alliance“Change or die” is an old phrase computer programmers use to highlight the speed of change in a world of innovation. Its implications go beyond programming and underscore the precarious situation we ...

WSJ Warns of Ransomware—Misses the Obvious Solution

Blog Published: 09/09/2016

By Susan Richardson, Manager/Content Strategy, Code42Read through the recent Wall Street Journal ransomware article and you’ll find some great stats on the growing threat and cost. One thing you won’t find: the word “backup.” We’re happy to see ransomware finally getting the attention it deserves...

Dealing with Dropbox: Unmasking Hackers with User Behavior Analytics

Blog Published: 09/07/2016

By Ganesh Kirti, Founder and CTO, PalerraDropbox was in the news a few months ago due to false reports of a data breach. Unfortunately, they’ve made headlines again. Vice reported that hackers stole over 60 million account details for the cloud storage service. This time, the breach is real, and ...

Five IT Security Projects That Will Accelerate Your Career

Blog Published: 09/07/2016

By Cameron Coles, Director of Product Marketing, Skyhigh NetworksThe skills required to be successful in IT security are changing. In a recent survey (download a free copy here) 30.7% IT leaders reported that a lack of skilled IT professionals is the greatest barrier to preventing data loss. Resp...

CASBs in Healthcare

Blog Published: 09/06/2016

By Rich Campagna, Vice President/Products & Marketing, BitglassInitially a laggard in cloud adoption, the healthcare industry is now adopting public cloud applications en masse, with adoption of cloud based productivity apps like Office 365 and Google Apps. Adoption is up from 8% in 2014 to o...

Déjà Vu: Moving to the Cloud Means Losing Visibility and Control All Over Again

Blog Published: 09/02/2016

By Todd Beebe, Guest Writer, Intel Security If you have been in IT security as long as I have, when it comes to moving to cloud, you are feeling a certain sense of déjà vu. We have been here before, this place of uncertainty, where we lack visibility into and control over our sensitive data.Think...

Cloud Security Alliance To Highlight Quantum-Safe Security, Containerization, and New Advanced Cloud Security Techniques at Upcoming Privacy.Security.Risk 2016 Conference

Press Release Published: 08/31/2016

Presented by CSA Congress and IAPP Privacy Academy, Event to Feature Presentations in Key Areas of Emerging Interests and New Approaches to Cloud Security San Jose, CA – August 31, 2016 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awaren...

Cloud Security Alliance Honors Inaugural Research Fellows

Press Release Published: 08/30/2016

Prestigious Designation Awarded to Individuals for Extraordinary CSA Research 
Volunteer Accomplishments The Cloud Security Alliance (CSA) today announced the list of inaugural members who are being awarded the CSA Research Fellow designation. The designation is the highest honor and distinction...

Learning from Delta: The High Cost of Outdated Backup Systems

Blog Published: 08/30/2016

By Susan Richardson, Manager/Content Strategy, Code42Chances are you know someone whose travel plans were snafued by the Delta system outage that cancelled 1,800 flights and delayed thousands more in August. IT experts are now pointing to Delta’s outdated disaster recovery technology as the culpr...

Looking for the CCM?

Start using the Cloud Controls Matrix to simplify compliance with multiple standards & regulations.