Cloud 101CircleEventsBlog

All Articles

All Articles
The Best Security KPIs Are the Ones That Matter to Your C-Suite

Blog Published: 05/25/2016

By Susan Richardson, Manager/Content Strategy, Code42What information security KPIs are you tracking? Are they tied specifically to your organization’s business goals? If not, consider that using predictive business performance metrics could help increase your organization’s profitability—by as m...

Cloud Security Alliance Opens Call for Presentations for EMEA Congress 2016

Blog Published: 05/24/2016

The Cloud Security Alliance has opened the call for papers for the 2016 CSA EMEA Congress, to be held November 15 at the Circulo de Bellas Artes in Madrid, Spain. CSA EMEA Congress is Europe’s premier cloud security event and is designed around the CSA’s core mission of promoting the use of best ...

Bridging the Divide Between CISOs and IT Decision Makers

Blog Published: 05/20/2016

By Rick Orloff, Chief Security Officer, Code42In a large organization, leaders create a vision and strategy for the business and employees work to achieve the vision. At the business unit level in information technology, CIOs, CSOs and CISOs define their strategies while other IT decision makers ...

Addressing Cloud Security Concerns in the Enterprise

Blog Published: 05/18/2016

By David Lucky, Director of Product Management, DatapipeBusinesses want to move to the cloud, they really do. And more than ever, they’re starting to make the switch: A Cloud Security Alliance (CSA) study that polled more than 200 IT professionals found that 71.2 percent of companies now have a f...

Cloud Security Alliance Asia Pacific Hosts Its 5th Annual CSA APAC Summit

Press Release Published: 05/16/2016

SINGAPORE – May 11, 2016 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment, announced today that it hosted its 5th annual CSA APAC Summit in Singapore, beginning M...

Cloud Computing: A Little Less Cloudy

Blog Published: 05/16/2016

By Christina McGhee, Manager/FedRAMP Technical Lead, SchellmanToday, consumers have an increasing interest in implementing cloud solutions to process and store their data. They are looking to take advantage of the benefits provided by cloud computing, including flexibility, cost savings, and avai...

Providing Trust and Assurance Through Cloud Certification and Attestation: A Complimentary CSA STAR Program Webinar by Schellman

Blog Published: 05/12/2016

By Avani Desai, Executive Vice President, SchellmanIn the last 24 months, the Cloud Security Alliance (CSA) has made great strides in enhancing their CSA Security, Trust and Assurance Registry (STAR) Program. In brief, the STAR Program is a publicly available registry designed to recognize assur...

Outdated Privacy Act Close to Getting an Upgrade

Blog Published: 05/12/2016

By Susan Richardson, Manager/Content Strategy, Code42The outdated Electronic Communications Privacy Act (ECPA) may finally get a much-needed upgrade, but the reform can’t come soon enough for Microsoft, other cloud providers and privacy advocates. Here’s what you need to know:The issues:The ECPA ...

How to Reduce Costs and Security Threats Using Two Amazon Tools

Blog Published: 05/10/2016

By David Lucky, Director of Product Management, DatapipeHave you ever gone to see a movie that would have been amazing if not for one person? The plot was engaging, the dialogue was well-written, and there were strong performances from most of the cast. But there was just that one actor who simpl...

DoD Updates Government Security Requirements for Cloud, But What Does That Really Mean?

Blog Published: 05/06/2016

By Brian Burns, Bid Response Manager/Government Affairs, DatapipeIT officials from the Department of Defense (DoD) have released an update to the Cloud Computing Security Requirements Guide (CC SRG), which establishes security requirements and other criteria for commercial and non-Defense Departm...

Five Endpoint Backup Features That Help Drive Adoption

Blog Published: 05/03/2016

By Susan Richardson, Manager/Content Strategy, Code42If you’re among the 28 percent of enterprises that still haven’t implemented a planned endpoint backup system, here are 5 key attributes to look for in a system, to help drive adoption and success. These recommendations are courtesy of Laura Du...

Cloud Security Alliance Announces World Class Speaker Line Up for Second Annual Federal Summit

Press Release Published: 04/28/2016

Program to Feature Insights and Perspectives into the Federal Government Cloud Strategy and Use of Cloud Services along with Best Practices to Ensure Cloud Security in Regulatory Environments Washington, DC – April 28, 2016 – The Cloud Security Alliance (CSA) today announced a world-class line u...

10 Key Questions to Answer Before Upgrading Enterprise Software

Blog Published: 04/27/2016

By Rachel Holdgrafer, Business Content Strategist, Code42The evolution of software has made possible things we never dreamed. With software upgrades come new competencies and capabilities, better security, speed, power and often disruption. Whenever something new enters an existing ecosystem, it ...

Survey of IT Pros Highlights Lack of Understanding of SaaS Data Loss Risks

Blog Published: 04/26/2016

By Melanie Sommer, Director of Marketing, Spanning by EMCRecently, Spanning – an EMC company and provider of backup and recovery for SaaS applications – announced the results of a survey* of over 1,000 IT professionals across the U.S. and the U.K. about trends in SaaS data protection. It turns ou...

Cloud Security Alliance Announces Speakers and Presentations for Upcoming SecureCloud 2016 Conference

Press Release Published: 04/25/2016

Leaders from Intel, Microsoft, Forrester Research and NIST Among Presenters at Upcoming Premiere European Cloud Security Event DUBLIN, IRELAND – April 25, 2016 – The Cloud Security Alliance (CSA), in collaboration with Fraunhofer FOKUS and ENISA, today announced the presentations and speaker lin...

Can a CASB Protect You From the Treacherous 12?

Blog Published: 04/25/2016

By Ganesh Kirti, Founder and CTO, PalerraMany frequently asked questions related to cloud security have included concerns about compliance and insider threats. But lately, a primary question is whether cloud services are falling victim to the same level of external attack as the data center. With...

NEW! Mitigating Risk for Cloud Apps Survey.

Press Release Published: 04/22/2016

Time: 15 minutes Prizes: 10 CCSK Tokens Closing Date: May 23rd Participate Now Abstract: Current state of SaaS security - with several years of cloud adoption in many organizations, approaches to security have been evolving rapidly. The purpose of this survey is to look at the specific concern...

The Panama Papers, Mossack Fonseca and Security Fundamentals

Blog Published: 04/21/2016

By Matt Wilgus, Practice Director, SchellmanThe release of details contained in the Panama Papers will be one of the biggest news stories of the year. The number of high-profile individuals implicated will continue to grow as teams comb through the 11.5 million documents leaked from Mossack Fonse...

Cloud Security Alliance to Offer CCSK ‘Train the Trainer’ Course in Milan

Press Release Published: 04/21/2016

Three-day course to be held in conjunction with Cloud Security Summit 2016 The Cloud Security Alliance (CSA) is pleased to announce that it will host its CCSK Train the Trainer course in Milan (May 17 and 18-19) at the ITWAY Academy as part of the Cloud Security Summit 2016. Conducted by recogni...

Open Peer Review: Cloud Data Center Security Working Group Charter

Press Release Published: 04/20/2016

The Cloud Security Alliance would like to invite you to review and comment on a proposed Cloud Data Center Security Working Group Charter. The focus of the Cloud Data Center Security working group is to develop and maintain a research portfolio providing capabilities to assist the cloud provider ...

Looking for the CCM?

Start using the Cloud Controls Matrix to simplify compliance with multiple standards & regulations.