Cloud 101CircleEventsBlog
Master CSA’s Security, Trust, Assurance, and Risk program—download the STAR Prep Kit for essential tools to enhance your assurance!

All Articles

All Articles
Cloud Security Alliance Announces Major Updates to Guidance v4.0

Press Release Published: 07/26/2017

Domains Restructured and Rewritten to Better Represent the Current State and Future of Cloud Computing Security LAS VEGAS, NV – Blackhat 2017 – July 26, 2017 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awareness of best practices to hel...

The Inaugural Philippines Summit attracts over 700 attendees

Press Release Published: 07/25/2017

At the Inaugural Cloud Security Alliance (CSA) Philippines Summit held on 11 July 2017, twenty-seven leading IT companies and start-ups demonstrated innovations across sectors of Cloud technology including Security, Datacenter, Enterprise, Mobile Apps, and E-Commerce. The CSA PH Summit was held ...

Patch Me If You Can

Blog Published: 07/24/2017

By Yogi Chandiramani, Technical Director/EMEA, ZscalerIn May, the worldwide WannaCry attack infected more than 200,000 workstations. A month later, just as organizations were regaining their footing, we saw another ransomware attack, which impacted businesses in more than 65 countries.What have w...

Cyberattacks Are Here: Security Lessons from Jon Snow, White Walkers & Others from Game of Thrones

Blog Published: 07/19/2017

An analysis of Game of Thrones characters as cyber threats to your enterprise.By Virginia Satrom, Senior Public Relations Specialist, ForcepointAs most of you have probably seen, we recently announced our new human point brand campaign. Put simply, we are leading the way in making security not ju...

CSA Industry Blog Listed Among 100 Top Information Security Blogs for Data Security

Blog Published: 07/10/2017

Our blog was recently ranked 35th among 100 top information security blogs for data security professionals by Feedspot. Among the other blogs named to the list were The Hacker News, Krebs on Security and Dark Reading. Needless to say, we're honored to be in such good company. To be listed, Fee...

Locking-in the Cloud: Seven Best Practices for AWS

Blog Published: 07/06/2017

By Sekhar Sarukkai, Co-founder and Chief Scientist, Skyhigh Networks With the voter information of 198 million Americans exposed to the public, the Deep Root Analytics leak brought cloud security to the forefront. The voter data was stored in an AWS S3 bucket with minimal protection. In fact, the...

Clouding Within the Lines: Keeping User Data Where It Belongs in the Age of GDPR

Blog Published: 07/03/2017

By Nathan Narayanan, Director of Product Management, NetskopeImportance around data residency hygiene has been around for a long time, but cloud services that often show up tend to focus more on user productivity and less on user data privacy. The highly-productive nature of these services increa...

Crank Up Your Cloud Security Knowledge with These Upcoming Webinars

Blog Published: 06/12/2017

By Hillary Barron, Research Analyst and CloudBytes Program Manager, Cloud Security AllianceWhether you’re trying to make the move to cloud while managing an outdated endpoint backup, attempting to figure out how to overcome the challenges pertaining to developing and deploying security automation...

Who Touched My Data?

Blog Published: 06/09/2017

You don’t know what you don’t knowBy Yael Nishry, Vice President of Business Development, Vaultive, and Arthur van der Wees, Founder and Managing Director, Arthur's LegalRansomwareIT teams generally use encryption to enable better security and data protection. However, in the hands of malicious p...

My Second Attempt at Explaining Blockchain to My Wife

Blog Published: 06/07/2017

I tried explaining blockchain to my wife and here’s what happened...By Antony Ma, CTO/PowerData2Go, Founding Chairman/CSA Hong Kong and Macau Chapter, and Board Member/CSA Singapore ChapterI introduced my wife to Python around nine months ago, and now she’s tinkering and has drawn a tortoise on h...

Cloud Security Alliance Announces “Grand Opening” of Its New Third-Party Global Consultancy Program

Press Release Published: 06/05/2017

Selected Inaugural Providers BH Consulting, KPMG, Optiv and Securosis Ready to Help Organizations Ensure Secure Cloud Implementation Best Practices SEATTLE, WA – June 5, 2017 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awareness of best...

Office 365 Deployment: Research Suggests Companies Need to “Think Different”

Blog Published: 06/02/2017

Survey shows what companies expected and what they found outBy Atri Chatterjee, Chief Marketing Officer, ZscalerIt’s been six years since Microsoft introduced Office 365, the cloud version of the most widely used productivity software suite. In those years, Office 365 has earned its place as the ...

Want To Empower Remote Workers? Focus On Their Data

Blog Published: 05/31/2017

By Jeremy Zoss, Managing Editor, Code42Here’s a nightmare scenario for IT professionals: Your CFO is working from the road on a high-profile, highly time sensitive business deal. Working late on documentation for the deal, a spilled glass of water threatens everything. His laptop is fried; all fi...

New CSA Report Offers Observations, Recommendations on Connected Vehicle Security

Blog Published: 05/25/2017

By John Yeoh, Research Director/Americas, Cloud Security AllianceConnected Vehicles are in the news for introducing new features and capabilities to the modern automobile. Headlines also highlight security hacks that compromise vehicle operations and usability. While sources note that the vulnera...

Cloud Security Alliance Releases New Guidance for Connected Vehicle Security

Press Release Published: 05/25/2017

New Report from Internet of Things (IoT) Working Group Identifies Vehicle Attack Vectors and Impacts, Provides Recommendations for Securing the Connected Vehicle Environment SEATTLE, WA – May 25, 2017 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and...

A Management System for the Cloud – Why Your Organization Should Consider ISO 27018

Blog Published: 05/22/2017

By Alex Hsiung, Senior Associate, Schellman & Co.Cloud computing technologies have revolutionized the way organizations manage and store their information. Where companies used to house and maintain their own data, a host of organizations have now made the switch to a cloud-based model due t...

Ransomware 101

Blog Published: 05/19/2017

By Jacob Serpa, Product Marketing Manager, BitglassUnless you’ve been living under a rock for the last few weeks, you know that there has been a notable increase in cyberattacks around the world. Hackers have been spreading a type of ransomware called “WannaCry” via emails that trick recipients t...

CTRL-Z and the Changing Data Landscape

Blog Published: 05/18/2017

By Mark Wojtasiak, Director of Product Marketing, Code42The massive “WannaCry” ransomware attack that appeared in Europe last week and spread to over 150 countries is a perfect illustration of why enterprise data storage is in a period of flux. Today, organizations can choose to keep their data i...

Malware: Painting a Picture

Blog Published: 05/17/2017

By Jacob Serpa, Product Marketing Manager, BitglassPart OneNow more than ever, companies are flocking to the cloud. Through a variety of software as a service (SaaS) and infrastructure as a service (IaaS), enterprises are able to raise their efficiency, increase their flexibility, and decrease co...

Data Loss Threatens M&A Deals

Blog Published: 05/11/2017

By Jeremy Zoss, Managing Editor, Code42One of the most popular breakout sessions at Evolution17 featured a great merger and acquisition (M&A) scenario: Midway through the deal, critical information leaks, devastating the value of the deal. How can you figure out how much info leaked—by whom a...

Looking for the CCM?

Start using the Cloud Controls Matrix to simplify compliance with multiple standards & regulations.