HIPAA Violations Examples and Cases – Eight Cautionary Tales
Blog Published: 10/06/2016
By Ajmal Kohgadai, Product Marketing Manager, Skyhigh NetworksThe Health Insurance Portability and Accountability Act (HIPAA) helps protect patient privacy by requiring healthcare organizations and their business associates to protect sensitive data — including how the data is used and disclosed....
Cloud Security Alliance Asia Pacific Hosts Financial Cloud Forum in Shanghai
Press Release Published: 10/05/2016
Organization Announces Upcoming Research and Future Events in Region Shanghai, China – October 6, 2016 -- The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment, today o...
Ransomware: Just Say No to Stronger Scare Tactics
Blog Published: 10/04/2016
By Susan Richardson, Manager/Content Strategy, Code42Ah, those ingenious cyber criminals. They keep coming up with ever more frightening ransomware threats. JIGSAW warns victims it will delete files every hour until they pay $150 USD in bitcoins. Chimera threatens to publish the victim’s files on...
Open Peer Review - Quantum-Safe Security Glossary
Press Release Published: 09/27/2016
The Cloud Security Alliance would like to invite you to review and comment on the Quantum-Safe Security working group's latest document, Quantum-Safe Security Glossary. This document is the latest in a series of documents from the working group introducing quantum computing. This document is inte...
Open Peer Review - Applied Quantum-Safe Security: Quantum Resistant Algorithms and Quantum Key Distribution position paper
Press Release Published: 09/27/2016
The Cloud Security Alliance would like to invite you to review and comment on the Quantum-Safe Security working group's latest document, Applied Quantum-Safe Security: Quantum Resistant Algorithms and Quantum Key Distribution. This document is the latest in a series of documents from the working ...
ReadITQuick Interview with Executive Vice President of Research at CSA - Luciano Santos
Press Release Published: 09/23/2016
ReadITQuick interview by Meghna Lal, September 21, 2016, with Luciano Santos, Executive Vice President of Research at Cloud Security Alliance. Full Interview at ReadITQuik.com
Ran$umBin: Disruptive Innovation for the Black Market
Blog Published: 09/22/2016
By Susan Richardson, Manager/Content Strategy, Code42Sometimes the ingenuity of the free market is truly remarkable. And in the case of the new black market for ransomed data, remarkably scary. One of the latest triumphs of the entrepreneurial spirit is Ran$umBin, a sort of eBay for ransomers—or ...
Cloud Security Alliance Announces Annual Ron Knode Service Award Recipients
Press Release Published: 09/15/2016
Contributions from Six Dedicated Individual CSA Volunteers Recognized in Honor of the Late CSA Member and Volunteer Contributor Ron Knode SAN JOSE, CA – CSA Congress US – September 15, 2016 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising aw...
EFSS Spreads Ransomware; Endpoint Backup Guarantees Recovery
Blog Published: 09/14/2016
By Kyle Hatlestad, Principal Architect, Code42One of the objections I’m hearing more and more is, “Why do I need backup when I have Microsoft OneDrive for Business (or Google Drive, Box or Dropbox for Business)?” On the surface, it may seem like endpoint backup isn’t needed because with an enterp...
Eight Questions to Ask When Evaluating a CASB
Blog Published: 09/12/2016
By Rich Campagna, Vice President/Products & Marketing, Bitglass Cloud Access Security Brokers are the hottest technology in enterprise security right now, topping Gartner's Top 10 list two years running. Widespread adoption of major cloud apps like Office 365 (and corresponding cloud security...
Data Privacy Survey: First 50 respondents get $20 Amazon gift cards – 300+ participants needed
Press Release Published: 09/09/2016
Data Privacy and Digital Transformation Survey Prizes: $20 Amazon Gift Cards for the first 50 respondents, Ring Video Doorbell, 10 CCSK Tokens Time: 10 minutes Abstract: Cloud-based technologies are driving digital transformation, but new data privacy regulations are hampering adoption. We’d l...
Cybersecurity: “Change or Die”
Blog Published: 09/09/2016
By Paul B. Kurtz, CEO TruSTAR Technology and Member of Board of Directors, Cloud Security Alliance“Change or die” is an old phrase computer programmers use to highlight the speed of change in a world of innovation. Its implications go beyond programming and underscore the precarious situation we ...
WSJ Warns of Ransomware—Misses the Obvious Solution
Blog Published: 09/09/2016
By Susan Richardson, Manager/Content Strategy, Code42Read through the recent Wall Street Journal ransomware article and you’ll find some great stats on the growing threat and cost. One thing you won’t find: the word “backup.” We’re happy to see ransomware finally getting the attention it deserves...
Dealing with Dropbox: Unmasking Hackers with User Behavior Analytics
Blog Published: 09/07/2016
By Ganesh Kirti, Founder and CTO, PalerraDropbox was in the news a few months ago due to false reports of a data breach. Unfortunately, they’ve made headlines again. Vice reported that hackers stole over 60 million account details for the cloud storage service. This time, the breach is real, and ...
Five IT Security Projects That Will Accelerate Your Career
Blog Published: 09/07/2016
By Cameron Coles, Director of Product Marketing, Skyhigh NetworksThe skills required to be successful in IT security are changing. In a recent survey (download a free copy here) 30.7% IT leaders reported that a lack of skilled IT professionals is the greatest barrier to preventing data loss. Resp...
CASBs in Healthcare
Blog Published: 09/06/2016
By Rich Campagna, Vice President/Products & Marketing, BitglassInitially a laggard in cloud adoption, the healthcare industry is now adopting public cloud applications en masse, with adoption of cloud based productivity apps like Office 365 and Google Apps. Adoption is up from 8% in 2014 to o...
Déjà Vu: Moving to the Cloud Means Losing Visibility and Control All Over Again
Blog Published: 09/02/2016
By Todd Beebe, Guest Writer, Intel Security If you have been in IT security as long as I have, when it comes to moving to cloud, you are feeling a certain sense of déjà vu. We have been here before, this place of uncertainty, where we lack visibility into and control over our sensitive data.Think...
Cloud Security Alliance To Highlight Quantum-Safe Security, Containerization, and New Advanced Cloud Security Techniques at Upcoming Privacy.Security.Risk 2016 Conference
Press Release Published: 08/31/2016
Presented by CSA Congress and IAPP Privacy Academy, Event to Feature Presentations in Key Areas of Emerging Interests and New Approaches to Cloud Security San Jose, CA – August 31, 2016 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awaren...
Cloud Security Alliance Honors Inaugural Research Fellows
Press Release Published: 08/30/2016
Prestigious Designation Awarded to Individuals for Extraordinary CSA Research Volunteer Accomplishments The Cloud Security Alliance (CSA) today announced the list of inaugural members who are being awarded the CSA Research Fellow designation. The designation is the highest honor and distinction...
Learning from Delta: The High Cost of Outdated Backup Systems
Blog Published: 08/30/2016
By Susan Richardson, Manager/Content Strategy, Code42Chances are you know someone whose travel plans were snafued by the Delta system outage that cancelled 1,800 flights and delayed thousands more in August. IT experts are now pointing to Delta’s outdated disaster recovery technology as the culpr...