Cloud 101CircleEventsBlog

All Articles

All Articles
May the Fourth Be with EU

Blog Published: 04/20/2016

Data Privacy Gets a Stronger Light SaberBy Nigel Hawthorn, EMEA Marketing Director, Skyhigh NetworksOn April 14, 2016, the EU Parliament passed the long-awaited new EU rules for personal data protection (GDPR). Everyone who holds or processes data on individuals in the 28 countries of the EU has ...

CloudBytes Webinars in May

Press Release Published: 04/20/2016

We have several interesting webinars coming up in May! Meeting international requirements and leveraging CSA STAR for supply chain management John DiMaria of BSI May 4th--10am PST https://www.brighttalk.com/webcast/10415/197749 Improve CX, Productivity, Revenues and Security with Identity Coher...

WP29: Thumbs Down to Draft EU-US Privacy Shield

Blog Published: 04/20/2016

By Françoise Gilbert,Global Privacy and Cybersecurity Attorney, Greenberg TraurigIn a 58-page opinion published April 13, 2016, the influential European Union Article 29 Working Party (WP29), which includes representatives of the data protection authorities of the 28 EU Member States, expressed ...

BYOD Stalled? Three Tips to Get It Going

Blog Published: 04/19/2016

By Susan Richardson, Manager/Content Strategy, Code42Despite some surveys that say Bring Your own Device (BYOD) is growing, the CyberEdge Group’s recently released 2016 Cyberthreat Defense Report found that enterprise BYOD programs have stalled. Only one-third of respondents this year had impleme...

Open Survey: Defeating Insider Threats

Press Release Published: 04/13/2016

We have a new survey entitled "Defeating the Insider Threat and Shoring up the Data Security Lifecycle" Participate now Time: 10-15 minutes Prizes: 5 CCSK Tokens Goal of the Survey: Everything we know about defeating the insider threat seems not to be solving the problem. In fact, evidence fr...

Panama Papers Expose Data Security Deficiencies in Law Firms

Blog Published: 04/12/2016

By Rick Orloff, Chief Security Officer, Code42The unprecedented leak of 11.5 million files from the database of the world’s fourth biggest offshore law firm is riveting. As details continue to emerge about the Panama Papers leak, the money laundering and secretive tax regimes and high-profile cli...

CSA Releases New White Paper on Current Cloud Certification Challenges Ahead and Proposed Solutions

Blog Published: 04/11/2016

By Daniele Catteddu, Chief Technology Officer, Cloud Security AllianceToday, the Cloud Security Alliance has released the CSA STAR Program & Open Certification Framework in 2016 and Beyond, an important new whitepaper that has been created to provide the security community with a description ...

How CASB Is Different from Web Proxy / Firewall

Blog Published: 04/08/2016

By Cameron Coles, Sr. Product Marketing Manager, Skyhigh Networks A common question that arises as IT teams begin to look at cloud access security broker (CASB) products goes something like, “we already have a web proxy and/or firewall, how is this different?” or “does CASB replace my web proxy /...

How to Get C-suite Support for Insider Threat Prevention

Blog Published: 04/06/2016

By Susan Richardson, Manager/Content Strategy, Code42If you’re not getting support and adequate funding from the C-suite to address insider threats, a recent report highlights a powerful persuasive tool you may have overlooked: money—as in fines (cha-ching), lawsuits (cha-ching) and credit monito...

Don’t Let Your Cloud Security Strategy Get Railroaded by Old Thinking

Blog Published: 04/04/2016

By Player Pate, Senior Manager/Product Marketing, Cisco Security Business GroupThe standard gauge used for railroads (that is the distance between the rails) in the U.S. is four feet, eight and a half inches, which is an odd number however you look at it. The history behind it is even stranger an...

Cloud Security Alliance Releases Results of Software-Defined Perimeter Hackathon

Press Release Published: 03/31/2016

CSA, The World’s Leading Cloud Organization Collaborated with Verizon and Vidder To Validate Security and Feasibility of High Availability Public Cloud Architecture at Fourth Annual CSA Hackathon at the RSA Conference 2016 SEATTLE, WA – March 31, 2016 – The Cloud Security Alliance (CSA), today r...

Four Security Solutions Not Stopping Third-Party Data Breaches

Blog Published: 03/31/2016

By Philip Marshall, Director of Product Marketing, CryptzoneA new breed of cyberattack is on the rise. Although it was practically unheard of a few years ago, the third-party data breach is rapidly becoming one of the most infamous IT security trends of modern times: Target, Home Depot, Goodwill,...

Kicking Tires on World Backup Day: A Five-Point Inspection for Endpoint Backup

Blog Published: 03/29/2016

By Rachel Holdgrafer, Business Content Strategist, Code42Living with the constant threat of data breach or loss, large organizations have comprehensive remediation plans designed to guarantee speedy data recovery and business continuity. March 31, 2016 is World Backup Day—the perfect time to eval...

April CloudByte Webinars

Press Release Published: 03/28/2016

We have a ton of CloudBytes coming up in April! Click the links below each description to learn more or save your seat. If you want to see all upcoming and past CloudBytes click here: https://cloudsecurityalliance.org/research/cloudbytes/ Best Practices for Protecting Your Data in a Multi- and H...

Top 3 Malware Bogeymen Keeping CISOs Up at Night

Blog Published: 03/22/2016

By Susan Richardson, Manager/Content Strategy, Code42What keeps CISOs up at night? Of all the cyberthreats, malware sends chills down a CISO’s spine, according to The CyberEdge Group’s recently released 2016 Cyberthreat Defense Report. Malware bogeymen come in many shapes and sizes. Here are thre...

CIO, CISO and IT Practitioners Worry They Will Face a Datastrophe!

Blog Published: 03/18/2016

By Rick Orloff, Chief Security Officer, Code42We are not lacking choices: whether it’s in the information we consume, the things we can buy or the ability to express ourselves through multimedia channels. It’s therefore no surprise that our most valuable asset, human capital, is finding ways to w...

EU Safe Harbor and Privacy Shield: Timelines, Deadlines and Red Lines

Blog Published: 03/16/2016

What has happened since safe harbor was declared invalid and what’s next? By Nigel Hawthorne, EMEA Marketing Director, Skyhigh Networks As a quick reminder, Safe Harbor was the primary legal mechanism that allowed US-based companies and cloud providers to transfer data on European ind...

CSA Summit San Francisco 2016 Recap

Blog Published: 03/11/2016

By Frank Guanco, Research Project Manager, CSA Global At the end of February, the Cloud Security Alliance (CSA) concluded its CSA Summit San Francisco 2016 with a full slate of presentations, releases, and announcements. CSA Summit kicked off the week with a full day of speakers and panels on ...

Between SSL-cylla and Charib-TLS

Blog Published: 03/11/2016

By Jacob Ansari, Manager, Schellman & Company, Inc.Securing encrypted Internet traffic transmissions, such as those between web browsers and web servers, is decidedly not simple. Despite the fact that well-established protocols, namely Secure Sockets Layer (SSL) and Transport Layer Security (...

15 Data Security Policies Ignored by Modern Workers

Blog Published: 03/09/2016

By Rachel Holdgrafer, Business Content Strategist, Code42IT isn’t the only department stretched thin. In the past 20 years the economy has grown nearly 60 percent. Corporate profits have increased 20 percent. And wages have stagnated for most Americans. The workday goes from 9 to 7 and the U.S. i...

Looking for the CCM?

Start using the Cloud Controls Matrix to simplify compliance with multiple standards & regulations.