Securing the Converged Cloud Takes Center Stage at the Cloud Security Alliance’s Annual CSA Summit at RSA Conference 2017
Press Release Published: 01/13/2017
General Keith Alexander of IronNet Cybersecurity and Robert Herjavec of Herjavec Group to Keynote at this Year’s Event. Registration Now Open. San Francisco, CA – January 13, 2017 – RSA Conference 2017 -- The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining a...
Long Con or Domino Effect: Beware the Secondary Attack
Blog Published: 01/12/2017
By Jeremy Zoss, Managing Editor, Code42Lightning may not strike twice, but cybercrime certainly does. The latest example: A year after the major hack of the U.S. Office of Personnel Management (OPM), cyber criminals are again targeting individuals impacted by the OPM breach with ransomware attac...
Six Cloud Threat Protection Best Practices from the Trenches
Blog Published: 01/06/2017
By Ajmal Kohgadai, Product Marketing Manager, Skyhigh NetworksAs enterprises continue to migrate their on-premises IT infrastructure to the cloud, they often find that their existing threat protection solutions aren’t sufficient to consistently detect threats that arise in the cloud. While securi...
Behavox on course for Level 2 STAR Attestation from the Cloud Security Alliance
Press Release Published: 12/29/2016
Rigorous Third Party Independent Assessment To Validate Company’s Security Posture SEATTLE, WA – December 28, 2016 - The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environme...
CSA’s Big Data Working Group seeking new Co-chairs to develop and maintain Research Portfolio
Press Release Published: 12/23/2016
The Cloud Security Alliance’s Big Data Working Group is seeking new co-chairs to develop and maintain a research portfolio providing capabilities to lead the crystallization of best practices for security and privacy in big data, help industry and government on adoption of best practices, establi...
Three Lessons From the San Francisco Muni Ransomware Attack
Blog Published: 12/22/2016
By Laurie Kumerow, Consultant, Code42On Black Friday, a hacker hit San Francisco’s light rail agency with a ransomware attack. Fortunately, this story has a happy ending: the attack ended in failure. So why did it raise the hairs on the back of our collective neck? Because we fear that next time ...
Call for Participation: Contribute to CSA Security Guidance v4.0 Peer Review
Press Release Published: 12/21/2016
Closing Date: Jan 13th, 2017 The Cloud Security Alliance would like to invite you to review and comment on 12 Domains of the CSA's Security Guidance for Critical Areas of Focus in Cloud Computing. This document acts as a practical, actionable roadmap to individuals looking to safely and securely...
Adding Up the Full Cost of a Data Breach
Blog Published: 12/19/2016
By Nigel Hawthorn, Skyhigh Networks, EMEA Marketing DirectorData breaches are happening all the time; often they hit the news for a short while then they are replaced with the latest list of victims, so we thought we’d review a data breach from a year ago and look back at the total cost to the co...
Cyber Insurance Against Phishing? There’s a Catch
Blog Published: 12/15/2016
By Jeremy Zoss, Managing Editor, Code42If one of your employees gets duped into transferring money or securities in a phishing scam, don’t expect your cyber insurance policy to cover it. And even your crime policy won’t cover it unless you purchase a specific social engineering endorsement. Many ...
Standardizing Cloud Security with CSA STAR Certification
Blog Published: 12/14/2016
By Tolga Erbay, Senior Manager, Security Risk and Compliance, DropboxIn early 2014 Dropbox joined the Cloud Security Alliance (CSA). Working with the CSA is an important part of Dropbox’s commitment to security and transparency.In June of 2014 Dropbox achieved Level 1 Certification through STAR, ...
New Survey: Public Cloud Workloads
Press Release Published: 12/10/2016
Public Cloud Workloads Survey Time: 15-20 minutes Closing Date: Jan 9th, 2017 Prizes: 5 CCSK Tokens Go to Survey Abstract: Despite a wide range of commercial software applications, many enterprises still have unique requirements they fulfill with custom, internally developed applications. For ...
IBM Touts Major Mac Cost Savings; IT Professionals Still Hesitant
Blog Published: 12/09/2016
By Lance Logan, Manager/Global Marketing Program, Code42For the second year in a row, IBM’s Fletcher Previn wowed the audience at the JAMF user conference with impressive statistics on how the company’s growing Mac-based workforce is delivering dramatic and measurable business value.IBM expects M...
DevOpsSec, SecDevOps, DevSecOps: What's in a Name?
Blog Published: 12/05/2016
By Jamie Tischart, CTO Cloud/SaaS, Intel SecurityThe world is awash in DevOps, but what does that really mean? Although DevOps can mean several things to different individuals and organizations, ultimately it is about the cultural and technical changes that occur to deliver cloud services in a hi...
Insurance Carrot Beats Government Stick in Quest for Stronger Cybersecurity
Blog Published: 12/02/2016
By Laurie Kumerow, Consultant, Code42When it comes to cybersecurity, the U.S. federal government recognizes the carrot is more effective than the stick. Instead of using regulations to increase data security and protect personal information within private organizations, the White House is enlisti...
Cybersecurity in President Trump's America: The first 100 days | Katie Lewin - Federal Director of Cloud Security Alliance Weighs In
Press Release Published: 11/30/2016
It could take months to know what the Trump administration's cybersecurity policy will be. Cyber-defense experts weigh in with advice and best practices for securing your company today. November 28, 2016, 10:15 AM PST From Katie Lewin - Federal Director, Cloud Security Alliance Historically wh...
One Day Is a Lifetime in Container Years
Blog Published: 11/30/2016
By Jon King, Security Technologist and Principal Engineer, Intel Security Securing virtual assets that appear and disappear. The average life span of a container is short and getting shorter. While some organizations use containers as replacements for virtual machines, many are using them increas...
Out of the Shadows
Blog Published: 11/23/2016
By Patty Hatter, Vice President and General Manager, Intel Security Group Professional ServicesHow to Bring Cloud Usage into the LightOn any given day – with a quick spot-check – you’ll probably find that up to half of your company’s IT usage is basically hidden in the shadows of various business...
Cloud Security Alliance Releases Report on State of Cloud Adoption in India
Press Release Published: 11/23/2016
Findings Come on the Heels of Successful CSA APAC Congress in Bengaluru Bengaluru, India – November 22, 2016 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment, su...
Evolving Threats Compel an About-face in Data Protection Strategy
Blog Published: 11/21/2016
By Vijay Ramanathan, Vice President of Product Management, Code42It’s time to flip our thinking about enterprise information security. For a long time, the starting point of our tech stacks has been the network. We employ a whole series of solutions on servers and networks—from monitoring and al...
Container Sprawl: The Next Great Security Challenge
Blog Published: 11/18/2016
By Jon King, Security Technologist and Principal Engineer, Intel SecurityAnd you thought virtualization was tough on security …Containers, the younger and smaller siblings of virtualization, are more active and growing faster than a litter of puppies. Recent stats for one vendor show containers n...