Cloud 101CircleEventsBlog
Master CSA’s Security, Trust, Assurance, and Risk program—download the STAR Prep Kit for essential tools to enhance your assurance!

All Articles

All Articles
Cloud Security Alliance Issues New Paper on Understanding Quantum Random Number Generators

Press Release Published: 06/27/2016

The Cloud Security Alliance (CSA) today announced the availability of a new research brief from the Quantum-Safe Security (QSS) Working Group titled Quantum Random Number Generators, a whitepaper that looks to detail the impact of randomness on security in an effort to develop the building blocks...

Little Bits of Security – Micro-Segmentation in Clouds

Blog Published: 06/27/2016

By Darren Pulsipher, Enterprise Solution Architect, Intel Corp.Cloud environments have made some things much easier for development teams and IT organizations. Self-service portals have cut down the amount of “hands on” intervention to spin up new environments for new products. Provisioning of ne...

Verizon DBIR Says You Can’t Stop the Storm—But You Can See It Coming

Blog Published: 06/22/2016

By Susan Richardson, Manager/Content Strategy, Code42The 2016 Verizon Data Breach Investigations Report (DBIR) paints a grim picture of the unavoidable enterprise data breach. But accepting the inevitability of breaches doesn’t mean accepting defeat. It’s like severe weather: you can’t prevent a ...

Why You Need a Multi-Layer Approach to Public Cloud Security

Blog Published: 06/20/2016

By Scott Montgomery, Vice President & Chief Technical Strategist, Intel Security GroupWould you hand your house keys to a total stranger and then go away on vacation for two weeks? Probably not, but that’s precisely what some businesses do when they move applications and data to the public cl...

Confident Endpoint Visibility Responds to Modern Data Protection Problems

Blog Published: 06/17/2016

By Joe Payne, President and CEO, Code42Consumer tech adoption has outpaced tech evolution in business for more than ten years. SaaS and cloud solutions, new apps and devices are at the disposal of empowered workers, making it very easy for employees to get what they need to work anywhere or—despi...

More Than One-Fourth of Malware Files “Shared”

Blog Published: 06/15/2016

By Krishna Narayanaswamy, Chief Scientist, NetskopeLast week, Netskope released its global Cloud Report as well as its Europe, Middle East and Africa version highlighting cloud activity from January through March of 2016. Each quarter we report on aggregated, anonymized findings such as top used ...

Securing the Hybrid Cloud: What Skills Do You Need?

Blog Published: 06/14/2016

By Brian Dye, Corporate Vice President & General Manager/Corporate Products, Intel Security GroupWith enterprises moving to hybrid cloud environments, IT architectures are increasingly spread among on-premises infrastructure and public and private cloud platforms. Hybrid models offer many wel...

Leaky End Users Star in DBIR 2016

Blog Published: 06/10/2016

By Susan Richardson, Manager/Content Strategy, Code42Insider threat once again tops the list of enterprise cyber security threats in the 2016 Verizon Data Breach Investigations Report (DBIR). For the second straight year, Verizon research showed that the average enterprise is less likely to have ...

Filling the Cloud Security IT Skills Gap... and Preventing Attrition

Blog Published: 06/08/2016

By Brian Dye, Corporate Vice President & General Manager/Corporate Products, Intel Security GroupWith all the various cloud services being offered in multiple deployment options, coupled with the 500,000 new security threats discovered daily, the strain on IT staff has never been greater. The...

Data Privacy and Digital Transformation Survey in English, Español, and Português

Press Release Published: 06/07/2016

Prizes include: 10 CCSK Tokens, 100 $20 Amazon Gift Cards, and a Ring Video Doorbell. Data Privacy and Digital Transformation Cloud-based technologies are driving digital transformation, but new data privacy regulations are hampering adoption. We’d like to understand how you and your organizati...

Five Telltale Signs You Don’t Have the Latest Backup System

Blog Published: 06/02/2016

By Susan Richardson, Manager/Content Strategy, Code42It’s Backup Awareness Month—time to take stock of how well your backup system is serving your organization. To help you get started, here are five telltale signs you don’t have the most modern endpoint backup system:1. You still get Help Desk c...

Open Peer Review: Application Containers and Microservices Charter

Press Release Published: 06/01/2016

The CSA encourages its community to provide feedback in order to help identify any critical areas which may be missing in this document's focus as it regards to scope, deliverables/activities, and mission. The open review and comments period starts today and ends on Friday, July 1, 2016. We appre...

Open Surveys: Mitigating Risk for Cloud Apps and IT Security in the Age of Cloud

Press Release Published: 05/26/2016

We have two surveys open. If you have a few minutes and would like to win some cool prizes, consider taking our surveys. Mitigating Risk for Cloud Apps Time: 10-15 minutes Prizes: 10 CCSK tokens and a fun new prize will be added shortly Abstract: Current state of SaaS security - with several y...

Open Peer Review - Big Data Security and Privacy Handbook: 100 Best Practices in Big Data Security and Privacy

Press Release Published: 05/26/2016

The Cloud Security Alliance would like to invite you to review and comment on the Big Data working group's latest document, Big Data Security and Privacy Handbook: 100 Best Practices in Big Data Security and Privacy. This document lists out in detail the best practices that should be followed by ...

Which Security Topics Are AWS Users Most Interested In?

Blog Published: 05/26/2016

By David Lucky, Director of Product Management, DatapipeWe hope this blog provides an insightful dive into topics like cloud computing, managed services, products, and ways to improve your business strategy. Of course, our partners have great things to say, as well. One of those partners is AWS, ...

The Best Security KPIs Are the Ones That Matter to Your C-Suite

Blog Published: 05/25/2016

By Susan Richardson, Manager/Content Strategy, Code42What information security KPIs are you tracking? Are they tied specifically to your organization’s business goals? If not, consider that using predictive business performance metrics could help increase your organization’s profitability—by as m...

Cloud Security Alliance Opens Call for Presentations for EMEA Congress 2016

Blog Published: 05/24/2016

The Cloud Security Alliance has opened the call for papers for the 2016 CSA EMEA Congress, to be held November 15 at the Circulo de Bellas Artes in Madrid, Spain. CSA EMEA Congress is Europe’s premier cloud security event and is designed around the CSA’s core mission of promoting the use of best ...

Bridging the Divide Between CISOs and IT Decision Makers

Blog Published: 05/20/2016

By Rick Orloff, Chief Security Officer, Code42In a large organization, leaders create a vision and strategy for the business and employees work to achieve the vision. At the business unit level in information technology, CIOs, CSOs and CISOs define their strategies while other IT decision makers ...

Addressing Cloud Security Concerns in the Enterprise

Blog Published: 05/18/2016

By David Lucky, Director of Product Management, DatapipeBusinesses want to move to the cloud, they really do. And more than ever, they’re starting to make the switch: A Cloud Security Alliance (CSA) study that polled more than 200 IT professionals found that 71.2 percent of companies now have a f...

Cloud Security Alliance Asia Pacific Hosts Its 5th Annual CSA APAC Summit

Press Release Published: 05/16/2016

SINGAPORE – May 11, 2016 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment, announced today that it hosted its 5th annual CSA APAC Summit in Singapore, beginning M...

Looking for the CCM?

Start using the Cloud Controls Matrix to simplify compliance with multiple standards & regulations.