Cloud 101CircleEventsBlog
Master CSA’s Security, Trust, Assurance, and Risk program—download the STAR Prep Kit for essential tools to enhance your assurance!

All Articles

All Articles
Cloud Security Alliance Launches Crowdfunded Cloud Security Management Solution

Press Release Published: 11/15/2016

STARWatch SaaS Application Empowers Organizations to Manage Compliance & Risks Using CSA Standards and Best Practices SAN FRANCISCO - November 15, 2016 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awareness of best practices to help ...

Fight Against Ransomware Takes to the Cloud

Blog Published: 11/14/2016

By Raj Samani, EMEA CTO, Intel Security“How many visitors do you expect to access the No More Ransom Portal?”This was the simple question asked prior to this law enforcement (Europol’s European Cybercrime Centre, Dutch Police) and private industry (Kaspersky Lab, Intel Security) portal going live...

Personalized Ransomware: Price Set by Your Ability to Pay

Blog Published: 11/11/2016

By Susan RichardsonSmart entrepreneurs have long employed differential pricing strategies to get more money from customers they think will pay a higher price. Cyber criminals have been doing the same thing on a small scale with ransomware: demanding a larger ransom from individuals or companies f...

Cyber Security Tip for CISOs: Beware of Security Fatigue

Blog Published: 11/04/2016

By Susan Richardson, Manager/Content Strategy, Code42What’s the most effective thing you can do for cyber security awareness? Stop talking about it, according to a new study that uncovered serious security fatigue among consumers. The National Institute of Standards and Technology study, publishe...

CSA'S IOT SECURITY REPORT

Press Release Published: 11/03/2016

OCTOBER 28, 2016 via RESEARCHandMARKETS, The World's Largest Market Research Store Last week’s DDoS attack was the largest of its kind in history, and shows how easy Internet of Things devices can be compromised and used to conduct massive cyber-attacks. The attack has caused serious concern am...

The Dyn Outage and Mirai Botnet: Using Yesterday's Vulnerabilities to Attack Tomorrow's Devices Today

Blog Published: 11/02/2016

By Jacob Ansari, Manager, SchellmanOn Oct. 21, Dyn, a provider of domain name services (DNS), an essential function of the Internet that translates names like www.schellmanco.com to its numerical IP address, went offline after a significant distributed denial of service (DDoS) attack affected Dyn...

Cloud Security Alliance Releases Chinese Financial Services Report with Ernst & Young China

Press Release Published: 11/02/2016

Beijing, CHINA – November 1, 2016 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment, and Ernst & Young (EY) China, today released the results of a joint survey...

To Include or Not to Include – Scoping ISO 27001 and Colocation Service Providers

Blog Published: 10/31/2016

By Ryan Mackie, Principal and ISO Certification Services Practice Director, SchellmanIntroductionISO 27001 North American GrowthISO/IEC 27001:2015 (ISO 27001) certification is becoming more of a conversation in most major businesses in the United States. To provide some depth, there was a 20% inc...

Defeating Insider Threats in the Cloud

Blog Published: 10/27/2016

By Evelyn de Souza, Data Privacy and Security Leader, Cisco Systems and Strategy Advisor, Cloud Security Alliance Everything we know about defeating the insider threat seems to not be solving the problem. In fact, evidence from the Deep, Dark and Open Web points to a greatly worsening problem....

Everything You've Ever Posted Becomes Public from Tomorrow

Blog Published: 10/26/2016

By Avani Desai, Executive Vice President, Schellman & Co. As I sit here, ironically just wrapping up a privacy conference, scrolling my Facebook wall, I am seeing dozens of posts from smart, professional, aware people, all posting an apparent disclaimer to Facebook in an attempt...

Five Prevention Tips and One Antidote for Ransomware

Blog Published: 10/25/2016

By Susan Richardson, Manager/Content Strategy, Code42During National Cyber Security Awareness Month, understanding the ins and outs of ransomware seems particularly important—given the scandalous growth of this malware. In this webinar on ransomware hosted by SC Magazine, guest speaker John Kinde...

Happy Birthday to… Wait, Who’s This Guy?

Blog Published: 10/11/2016

By Jacob Ansari, Manager, SchellmanHow many arbitrary people do you have to get into a room before two of them share the same birthday? Probability theory has considered this problem for so long that no one is quite certain who first posed the so-called “birthday problem” or “birthday paradox.” W...

Minister Denis Naughten to Address EU Security Directive at (ISC)2 Security Congress EMEA

Blog Published: 10/11/2016

Denis Naughten will address (ISC)2 Security Congress EMEA delegates on the latest developments in Ireland’s National Cyber Security Strategy since its launch in 2015, including the requirement to transpose the European Union Security of Network and Information Systems Directive (2016/1148) into n...

CSA Internet of Things Working Group Releases Industry’s First Guidance for Securing IoT Product Ecosystem

Press Release Published: 10/07/2016

‘Designing and Developing Secure IoT Products’ Provides Actionable and Useful Guidance to Raise the Overall Security of IoT Products San Jose, CA – CSA Congress 2016 – October 7, 2016 – The Cloud Security Alliance (CSA) today released a new detailed and hefty guidance report titled Future-proofi...

Cloud Security Alliance EMEA to Host Fifth Annual Congress

Press Release Published: 10/07/2016

Agenda and Keynote Speakers Announced for Premiere European Cloud Security Event MADRID, SPAIN – October 7, 2016 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment...

HIPAA Violations Examples and Cases – Eight Cautionary Tales

Blog Published: 10/06/2016

By Ajmal Kohgadai, Product Marketing Manager, Skyhigh NetworksThe Health Insurance Portability and Accountability Act (HIPAA) helps protect patient privacy by requiring healthcare organizations and their business associates to protect sensitive data — including how the data is used and disclosed....

Cloud Security Alliance Asia Pacific Hosts Financial Cloud Forum in Shanghai

Press Release Published: 10/05/2016

Organization Announces Upcoming Research and Future Events in Region Shanghai, China – October 6, 2016 -- The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment, today o...

Ransomware: Just Say No to Stronger Scare Tactics

Blog Published: 10/04/2016

By Susan Richardson, Manager/Content Strategy, Code42Ah, those ingenious cyber criminals. They keep coming up with ever more frightening ransomware threats. JIGSAW warns victims it will delete files every hour until they pay $150 USD in bitcoins. Chimera threatens to publish the victim’s files on...

Open Peer Review - Quantum-Safe Security Glossary

Press Release Published: 09/27/2016

The Cloud Security Alliance would like to invite you to review and comment on the Quantum-Safe Security working group's latest document, Quantum-Safe Security Glossary. This document is the latest in a series of documents from the working group introducing quantum computing. This document is inte...

Open Peer Review - Applied Quantum-Safe Security: Quantum Resistant Algorithms and Quantum Key Distribution position paper

Press Release Published: 09/27/2016

The Cloud Security Alliance would like to invite you to review and comment on the Quantum-Safe Security working group's latest document, Applied Quantum-Safe Security: Quantum Resistant Algorithms and Quantum Key Distribution. This document is the latest in a series of documents from the working ...

Looking for the CCM?

Start using the Cloud Controls Matrix to simplify compliance with multiple standards & regulations.