Cloud 101CircleEventsBlog

All Articles

All Articles
Something’s Gotta Give, And It’s You

Blog Published: 02/17/2016

By David Payne, VP Systems Engineering, Code42IT has lost the ability to unilaterally command which software employees access and what devices they carry. Anybody with a credit card can get the tools he or she needs to work fast and unencumbered. This freedom has significant impact on data securi...

Cloud Security Alliance APAC Summit 2016 Set to Open for CloudAsia

Press Release Published: 02/12/2016

Cloud Security Alliance and Infocomm Development Authority (IDA) partners to deliver international perspective at CloudAsia SINGAPORE – February 12, 2016 - Cloud Security Alliance Asia Pacific (CSA APAC) is proud to announce that this year’s CSA APAC Summit will be the curtain opener for Infocom...

Tentative Safe Harbour Agreement Reached—For Now

Blog Published: 02/12/2016

By Rachel Holdgrafer, Business Content Strategist, Code42The European Union and the United States have reached a preliminary agreement that would allow companies doing business on both sides of the Atlantic to resume transmitting individuals’ digital data.Struck down in October 2015 for failing t...

Can Wanted Cybercriminals Be Stopped?

Blog Published: 02/11/2016

By Leo Taddeo, ‎Chief Security Officer, CryptzonePart 2 of a 2-part seriesI recently wrote about the challenges around cybercrime reporting in the US. Organizations often fail to notify law enforcement after discovering a network intrusion – partly because of a reluctance on their part to admit ...

Five Surprising Truths from the Cloud Security Alliance’s Latest Survey

Blog Published: 02/08/2016

Survey of 200 it leaders finds that cloud perceptions, it security reporting structures, and cloud security approaches are changingBy Cameron Coles, Senior Product Marketing Manager, Skyhigh NetworksAfter years of IT leaders loudly voicing their concerns about the security of the cloud, trust in ...

Cloud Security Alliance to Host Fourth Software Defined Perimeter Hackathon; Top Prize of $10,000 up for Grabs

Press Release Published: 02/04/2016

Participants Invited to Attack Mission-Critical Cloud Application Architecture at RSA Conference; Verizon to Lead Testing Effort San Francisco, Calif. (RSA Conference Booth #S2614) – Feb. 4, 2016 - The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and rais...

Improving Data Privacy One Employee at a Time

Blog Published: 02/04/2016

By Rick Orloff, ‎Vice President and Chief Security Officer, Code 42It’s no Hallmark holiday, but here at Code42, Data Privacy Day is kind of a big deal. We think it should be a big deal for your organization, too. It’s a great chance to focus on the biggest security threat in your organization: y...

You’ve Been the Victim of a Cybercrime. Who You Gonna Call?

Blog Published: 02/02/2016

By Leo Taddeo, ‎Chief Security Officer, CryptzonePart 1 of a 2-part seriesRight now, one of the greatest challenges in the fight against cybercrime is the difficulty we have in creating a meaningful deterrent for hackers.Basically, the number of cybercriminals out there is demonstrably very larg...

What They’re Not Telling You About Global Deduplication

Blog Published: 01/29/2016

By Rachel Holdgrafer, Business Content Strategist, Code42When it comes to endpoint backup, is global deduplication a valuable differentiator?Not if data security and recovery are your primary objectives.Backup vendors that promote global deduplication say it minimizes the amount of data that must...

Early bird discount for CSA CEE Summit 2016 ends soon!

Press Release Published: 01/28/2016

We would like to invite you to the 4th CSA CEE Summit that will take place on the March 8th in Ljubljana. The event topic is Public Cloud Security - What is easy and what is missing? Summit will present practical solutions for the challenges faced when transitioning to the cloud and treating sec...

Serious Cybersecurity Challenges Ahead in 2016

Blog Published: 01/28/2016

By Phillip Marshall, Director of Product Marketing, CryptzoneBy now you’ll have settled into the New Year, looking ahead at what’s to come as we move swiftly through January. However, there are numerous unsettling predictions that mean 2016 is a year of many serious cybersecurity challenges – fr...

Open Survey: Enterprise Hybrid Cloud Security

Press Release Published: 01/26/2016

Hybrid cloud is a cloud deployment model using at least two different cloud deployment models (e.g. private, public, community). The deployments involved remain unique entities but are bound together by appropriate technology that enables interoperability, data portability and application portabi...

Open Peer Review: The Treacherous 12 - Cloud Computing Top Threats in 2016

Press Release Published: 01/23/2016

The Cloud Security Alliance would like to invite you to review and comment on the Top Threats Working Group's survey report, The Treacherous 12 - Cloud Computing Top Threats in 2016. The survey report shares findings and analysis from the Top Threats Working Group's survey from late 2015. The rev...

Open Peer Review: CCM v3.0.1 with ISO 27002/27017/27018 Candidate Mapping

Press Release Published: 01/23/2016

The Cloud Security Alliance would like to invite you to review and comment on the update to the Cloud Controls Matrix (CCM) v3.0.1. The update includes the ISO 27002/27017/27018 candidate mapping. In addition, there were minor updates that included spelling, style, and punctuation. This is your ...

2015 Breaches Show That Current Cybersecurity Measures Aren’t Enough

Blog Published: 01/22/2016

By Corey Williams, Senior Director/Product Management and Marketing, CentrifyLast year my colleague Chris Webber predicted that "Breach Headlines will Change IT Security Spend." Unfortunately the breach headlines of 2015 were even more striking than most could predict. 2015 breaches involved high...

Containers Aren’t New, But Ecosystem Growth Has Driven Development

Blog Published: 01/21/2016

By Thomas Campbell, Container World 2016Containers are getting a fair bit of hype at the moment, and February 2016 will see the first ever event dedicated to both the business and technical advantages of containers take place in Silicon Valley in the US.Here, Container World talks to Kyle Anderso...

What Is Data Deduplication and Who Cares?

Blog Published: 01/19/2016

By Rachel Holdgrafer, Business Content Strategist, Code42Data deduplication is a critical component of managing the size (and cost) of a continuously growing data store that you will hear about when you research endpoint backup. Intelligent compression or “single-instance storage” eliminates redu...

Privileged-Account Attacks Are Behind Every Major Cyber Crime

Blog Published: 01/14/2016

By Susan Richardson, Manager/Content Strategy, Code42It’s unsettling: the people most accountable for an organization’s security are those most likely to compromise it. Privileged user accounts—IT administrators, application developers and C-suite executives—have been the cause of high-profile br...

CSA Survey: 64.9% of IT Trusts the Cloud as Much or More than On-Premises Solutions

Press Release Published: 01/13/2016

Sponsored by Skyhigh Networks, New Report Highlights Shift in Strategy Around Cloud Adoption and Security Seattle, WA – January 13, 2015 – Cloud Adoption does not have to mean opening up your organization to increased security risks and threats if the right policies are in place. That’s what the...

Upcoming CloudBytes for January and February 2016

Press Release Published: 01/13/2016

Emerging Approaches in a Cloud Connected Enterprise: Containers and Microservices Presenter: Anil Karmel, Co-Founder and CEO of C2 Labs Date: Jan 28–10:30am PT (6:30 GMT) Containers such as Docker and CoreOS Rkt deliver incredible capabilities to developers and operators and are powering the De...

Looking for the CCM?

Start using the Cloud Controls Matrix to simplify compliance with multiple standards & regulations.