Cloud 101CircleEventsBlog

All Articles

All Articles
Cloud Security Alliance Summit 2016 Set to Kick Off RSA Conference with “Cloudifying Information Security”

Press Release Published: 01/11/2016

Star of ABC's Shark Tank and Former Commissioner of U.S. Securities and Exchange Commission to Serve as Featured Keynote Speakers at Annual Event San Francisco, CA – January 11, 2016 (RSA Conference 2016) - The Cloud Security Alliance (CSA) today announced its preliminary agenda for CSA Summit 2...

Increase in Federal Government Cyber Attacks Lays Groundwork for 2016

Blog Published: 01/11/2016

By John Sellers, Vice President/Federal, LancopeAt the end of last year, we looked back and said that 2014 was the year of high profile cyber attacks on the private sector. Target, Michaels, Sony and several healthcare companies and universities were plastered all over the news headlines. So did ...

Cloud Security Alliance Announces Formation of Australia and New Zealand Regional Coordinating Body

Press Release Published: 01/08/2016

New Body to Serve Growing Demand for Cloud Security Interest and Best Practices through Access to More Regional ActivitiesSINGAPORE – January 8, 2016 - The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure ...

Cost of Data Breach, Loss and Remediation

Blog Published: 01/07/2016

By Rachel Holdgrafer, Business Content Strategist, Code42The Ponemon Institute’s 2015 Cost of Data Breach Study: Global Analysis reported that fallout and clean up efforts associated with a data breach cost companies across the globe $3.79 million on average. In the United States, organizations p...

Five Ways Your Employees Sidestep Information Security Policies

Blog Published: 12/29/2015

By Susan Richardson, Manager/Content Strategy, Code42A good employee finds ways to overcome roadblocks and get the job done. But in the case of enterprise IT security, good employees may be your biggest threat. In fact, a recent Dell survey found that nearly seventy percent of IT professionals be...

A Perspective on the Next Big Data Breach

Blog Published: 12/23/2015

By Kevin Beaver, Guest Blogger, LancopeIn looking at the headlines and breach databases, there haven’t been any spectacular, high-visibility incidents in recent weeks. It’s almost as if the criminals are lurking in the weeds, waiting to launch their next attack during the busy, upcoming holiday s...

Code42 CSO says, “Beware the data-stealing Grinch”

Blog Published: 12/22/2015

By Rick Orloff, Chief Security Officer, Code42Historically, corporations viewed security as an overhead expense required to meet regulatory controls and audits. As we head into a new year, we know breaches are inevitable and questions about security and data protection are being asked at a higher...

Predicting Cyber Security Trends in 2016

Blog Published: 12/21/2015

By TK Keanini, Chief Technology Officer, LancopeOne of my annual rituals is to take stock of the cyber security industry and determine what trends and challenges we are likely to see in the coming year. In the ever-evolving cyberspace, technology changes on a daily basis, and attackers are always...

Smart City Security

Blog Published: 12/17/2015

By Brian Russell, Co-Chair CSA IoT Working GroupGartner defines a smart city as an “urbanized area where multiple sectors cooperate to achieve sustainable outcomes through the analysis of contextual, real time information shared among sector-specific information and operational technology systems...

Humans: Still the Weakest Link In the Enterprise Information Security Posture

Blog Published: 12/16/2015

By Rachel Holdgrafer, Business Content Strategist, Code42When it comes to protecting enterprise data, it’s more about understanding processes, procedures and the humans using the system, and less about defending the physical hardware. Seventy-eight percent of respondents to the Ponemon 2015 State...

CSA APAC and NCDRC sign Memorandum of Understanding (MOU)

Press Release Published: 12/16/2015

The Cloud Security Alliance APAC and National Cyber Defense Research Centre (NCDRC) entered into a Memorandum of Understanding (MOU) on December 12, 2015.BANGALORE – December 16, 2015 - The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awareness...

RSVP to exciting CloudBytes Webinars in January

Press Release Published: 12/15/2015

CloudBytes webinar series is dedicated to educating the public on all things related to the cloud and next generation IT. We have two exciting webinars coming up: Making Trusted Decisions to Use the Cloud: A New Model to Succeed Presenter: Jeffrey Ritter, External Lecturer, University of Oxfor...

The Twelve Days of Cyber Plunder

Blog Published: 12/14/2015

By Phillip Marshall, Director of Product Marketing, CryptzoneAs the holiday season approaches, we caution you to take heed of the cyber perils in this familiar holiday tune.While we had a little fun with the verse, this cautionary tale unfortunately rings true for many.On the first day of Christ...

CSA’s Cloud Control Matrix (CCM) Releases Minor Update to Version 3.0.1

Press Release Published: 12/11/2015

CSA’s Cloud Control Matrix (CCM) Working Group has released a series of minor updates and corrections to version 3.0.1 of its CCM. These minor updates/corrections were based on feedback from our CCM user community. A tab was created in the spreadsheet titled “CCM Change Log” to capture the detai...

CSA Releases CloudTrust Protocol Prototype Source Code

Press Release Published: 12/10/2015

Thanks to the support of our peer reviewers and contributors (including the EU projects SPECS, A4Cloud and CUMULUS), CSA is pleased to announce the release of an open-source prototype implementation of the CTP API. The Cloud Trust Protocol (CTP) is designed to be a mechanism by which cloud servi...

Fix Insider Threat with Data Loss Prevention

Blog Published: 12/10/2015

By Rachel Holdgrafer, Business Content Strategist, Code42What do the Mercedes-Benz C Class, teeth whitening strips, the Apple iPhone and personally identifiable information have in common? Each is the item most commonly stolen from its respective category: luxury cars, personal care items, smartp...

An Overview of the Security Space and What’s Needed Today

Blog Published: 12/09/2015

By Kevin Beaver, Guest Blogger, LancopeFairly often, I have friends and colleagues outside of IT and security ask me how work is going. They’re curious about the information security industry and ask questions like: How much work are you getting? Why are we seeing so many breaches? Are things goi...

Gartner’s Latest CASB Report: How to Evaluate Vendors

Blog Published: 12/07/2015

Market Guide Compares CASB Vendors And Provides Evaluation CriteriaBy Cameron Coles, Senior Product Marketing Manager, Skyhigh NetworksAs sensitive data moves to the cloud, enterprises need new ways to meet their security, compliance, and governance requirements. According to Gartner Research, “t...

The EU GDPR and Cloud: Six Must-Dos to Comply

Blog Published: 12/04/2015

By Krishna Narayanaswamy, Co-founder and Chief Scientist, NetskopeYou don’t have to be European to care about the European Commission’s pending EU General Data Protection Regulation (GDPR). Set to be adopted in 2017 and implemented the following year, carrying penalties up to 5 percent of an ente...

Network Segmentation and Its Unintended Complexity

Blog Published: 12/03/2015

By Kevin Beaver, Guest Blogger, LancopeLook at the big security regulations, i.e. PCI DSS, and any of the long-standing security principles and you’ll see that network segmentation plays a critical role in how we manage information risks today. The premise is simple: you determine where your sens...

Looking for the CCM?

Start using the Cloud Controls Matrix to simplify compliance with multiple standards & regulations.