Cloud 101CircleEventsBlog
Master CSA’s Security, Trust, Assurance, and Risk program—download the STAR Prep Kit for essential tools to enhance your assurance!

All Articles

All Articles
ReadITQuick Interview with Executive Vice President of Research at CSA - Luciano Santos

Press Release Published: 09/23/2016

ReadITQuick interview by Meghna Lal, September 21, 2016, with Luciano Santos, Executive Vice President of Research at Cloud Security Alliance. Full Interview at ReadITQuik.com

Ran$umBin: Disruptive Innovation for the Black Market

Blog Published: 09/22/2016

By Susan Richardson, Manager/Content Strategy, Code42Sometimes the ingenuity of the free market is truly remarkable. And in the case of the new black market for ransomed data, remarkably scary. One of the latest triumphs of the entrepreneurial spirit is Ran$umBin, a sort of eBay for ransomers—or ...

Cloud Security Alliance Announces Annual Ron Knode Service Award Recipients

Press Release Published: 09/15/2016

Contributions from Six Dedicated Individual CSA Volunteers Recognized in Honor of the Late CSA Member and Volunteer Contributor Ron Knode SAN JOSE, CA – CSA Congress US – September 15, 2016 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising aw...

EFSS Spreads Ransomware; Endpoint Backup Guarantees Recovery

Blog Published: 09/14/2016

By Kyle Hatlestad, Principal Architect, Code42One of the objections I’m hearing more and more is, “Why do I need backup when I have Microsoft OneDrive for Business (or Google Drive, Box or Dropbox for Business)?” On the surface, it may seem like endpoint backup isn’t needed because with an enterp...

Eight Questions to Ask When Evaluating a CASB

Blog Published: 09/12/2016

By Rich Campagna, Vice President/Products & Marketing, Bitglass Cloud Access Security Brokers are the hottest technology in enterprise security right now, topping Gartner's Top 10 list two years running. Widespread adoption of major cloud apps like Office 365 (and corresponding cloud security...

Data Privacy Survey: First 50 respondents get $20 Amazon gift cards – 300+ participants needed

Press Release Published: 09/09/2016

Data Privacy and Digital Transformation Survey Prizes: $20 Amazon Gift Cards for the first 50 respondents, Ring Video Doorbell, 10 CCSK Tokens Time: 10 minutes Abstract: Cloud-based technologies are driving digital transformation, but new data privacy regulations are hampering adoption. We’d l...

Cybersecurity: “Change or Die”

Blog Published: 09/09/2016

By Paul B. Kurtz, CEO TruSTAR Technology and Member of Board of Directors, Cloud Security Alliance“Change or die” is an old phrase computer programmers use to highlight the speed of change in a world of innovation. Its implications go beyond programming and underscore the precarious situation we ...

WSJ Warns of Ransomware—Misses the Obvious Solution

Blog Published: 09/09/2016

By Susan Richardson, Manager/Content Strategy, Code42Read through the recent Wall Street Journal ransomware article and you’ll find some great stats on the growing threat and cost. One thing you won’t find: the word “backup.” We’re happy to see ransomware finally getting the attention it deserves...

Dealing with Dropbox: Unmasking Hackers with User Behavior Analytics

Blog Published: 09/07/2016

By Ganesh Kirti, Founder and CTO, PalerraDropbox was in the news a few months ago due to false reports of a data breach. Unfortunately, they’ve made headlines again. Vice reported that hackers stole over 60 million account details for the cloud storage service. This time, the breach is real, and ...

Five IT Security Projects That Will Accelerate Your Career

Blog Published: 09/07/2016

By Cameron Coles, Director of Product Marketing, Skyhigh NetworksThe skills required to be successful in IT security are changing. In a recent survey (download a free copy here) 30.7% IT leaders reported that a lack of skilled IT professionals is the greatest barrier to preventing data loss. Resp...

CASBs in Healthcare

Blog Published: 09/06/2016

By Rich Campagna, Vice President/Products & Marketing, BitglassInitially a laggard in cloud adoption, the healthcare industry is now adopting public cloud applications en masse, with adoption of cloud based productivity apps like Office 365 and Google Apps. Adoption is up from 8% in 2014 to o...

Déjà Vu: Moving to the Cloud Means Losing Visibility and Control All Over Again

Blog Published: 09/02/2016

By Todd Beebe, Guest Writer, Intel Security If you have been in IT security as long as I have, when it comes to moving to cloud, you are feeling a certain sense of déjà vu. We have been here before, this place of uncertainty, where we lack visibility into and control over our sensitive data.Think...

Cloud Security Alliance To Highlight Quantum-Safe Security, Containerization, and New Advanced Cloud Security Techniques at Upcoming Privacy.Security.Risk 2016 Conference

Press Release Published: 08/31/2016

Presented by CSA Congress and IAPP Privacy Academy, Event to Feature Presentations in Key Areas of Emerging Interests and New Approaches to Cloud Security San Jose, CA – August 31, 2016 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awaren...

Cloud Security Alliance Honors Inaugural Research Fellows

Press Release Published: 08/30/2016

Prestigious Designation Awarded to Individuals for Extraordinary CSA Research 
Volunteer Accomplishments The Cloud Security Alliance (CSA) today announced the list of inaugural members who are being awarded the CSA Research Fellow designation. The designation is the highest honor and distinction...

Learning from Delta: The High Cost of Outdated Backup Systems

Blog Published: 08/30/2016

By Susan Richardson, Manager/Content Strategy, Code42Chances are you know someone whose travel plans were snafued by the Delta system outage that cancelled 1,800 flights and delayed thousands more in August. IT experts are now pointing to Delta’s outdated disaster recovery technology as the culpr...

Cloud Security Alliance and SAFECode to Host Inaugural Developer Day Training Event in Bay Area as Part of Privacy.Security.Risk 2016 Conference Event

Press Release Published: 08/29/2016

Leading Industry Experts to Demonstrate and Discuss the Latest Techniques and Case Studies in Software Assurance and New Frontiers in Software Security Seattle, WA – August 29, 2016 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awareness ...

Cloud Security Alliance Big Data Working Group Releases ‘100 Best Practices in Big Data’ Report

Press Release Published: 08/26/2016

New Effort to Help Organizations Reduce Security and Privacy Threats in Big Data The Cloud Security Alliance (CSA), today announced the release of the new handbook from the CSA Big Data Working Group, outlining the 100 best practices in big data security. The Big Data Security and Privacy Handbo...

100 Best Practices in Big Data Security and Privacy

Blog Published: 08/26/2016

By Ryan Bergsma, Research Intern, CSA‘Big data’ refers to the massive amounts of digital information companies and governments collect about human beings and our environment. Experts anticipate that the amount of data generated will double every two years, from 2500 exabytes in 2012 to 40,000 exa...

Information Security Promises Are Made To Be Broken

Blog Published: 08/25/2016

By Mark Wojtasiak, Director of Product Marketing, Code42Morality insists that people will abide by the law and do the right thing; those promises have and will always be broken.Code42, along with almost every other major player in the information security space attended Black Hat 2016 in Las Vega...

Which Approach Is Better When Choosing a CASB? API or Proxy? How About Both?

Blog Published: 08/22/2016

By Bob Gilbert, Vice President/Product Marketing, Netskope There have been recent articles and blog posts arguing that the API approach is better than the proxy approach when it comes to selecting a cloud access security broker (CASB). The argument doesn’t really make sense at all. Both surely ha...

Looking for the CCM?

Start using the Cloud Controls Matrix to simplify compliance with multiple standards & regulations.