Cloud 101CircleEventsBlog

All Articles

All Articles
Cloud Security Alliance Releases Mobile Application Security Testing Initiative

Press Release Published: 12/02/2015

White Paper Ready for Peer Review SINGAPORE – December 2, 2015 - The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment, today announced that its Mobile Application Secu...

Cloud Security Alliance Adds Chinese Universities to the APAC Education Council

Press Release Published: 12/02/2015

SINGAPORE – December 2, 2015 - The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment, today announced the launch of the new CSA Asia- Pacific (APAC) Education Council in...

Cloud Security Alliance Successfully hosts Cross-Straits Working Level Meeting on Cybersecurity Following Xi-Ma Meeting in Singapore

Press Release Published: 12/01/2015

SINGAPORE – December 1, 2015 - On November 7, 2015, Mr Xi Jinping, President of the People's Republic of China (PRC), and Mr Ma Ying-jeou, President of the Republic of China (ROC/Chinese Taipei), met in Singapore. The Xi-Ma meeting held in Singapore has been one of the most significant events for...

Good and Bad News on Safe Harbour: Take a Life Ring or Hold Out for a New Agreement?

Blog Published: 12/01/2015

By Susan Richardson, Manager/Content Strategy, Code42If your organization relied on the now-invalid Safe Harbour agreement to legally transfer data between the U.S. and the EU, there’s good news and bad news.The good news? The European Commission just threw you some life rings. The governing body...

More Cyber Security Lessons From “The Martian”

Blog Published: 11/23/2015

By TK Keanini, Chief Technology Officer, LancopeIn last week’s post, I covered the methodologies Mark Watney used to stay alive on the surface of Mars and how those lessons can be adapted for better cyber security back on Earth. As usual, this post will contain spoilers for The Martian, so close ...

Six Reasons Why Encryption Back Doors Won’t Deter Terrorists

Blog Published: 11/20/2015

By Willy Leichter, Global Director of Cloud Security, CipherCloudLast week’s tragic events in Paris, and fears over similar terrorist attacks around the world, have revived a long-standing debate. Early evidence suggests that the terrorists used a readily available encryption app to hide their pl...

Never Pay the Ransomer

Blog Published: 11/20/2015

By Rachel Holdgrafer, Business Content Strategist, Code42CryptoWall has struck again—only this time it’s nastier than before. With a redesigned ransom note and new encryption capabilities, BleepingComputer.com’s description of the “new and improved” CryptoWall 4.0 sounds more like a marketing bro...

The Numbers Behind Cloud User Error

Blog Published: 11/19/2015

By Sam Bleiberg, Corporate Communications Manager, Skyhigh NetworksIn the not-too-distant past, service providers had a tough time convincing enterprise IT departments that cloud platforms were secure enough for corporate data. Fortunately perspectives on cloud have matured, and more and more org...

Securing Smart Cities Issues Guidelines for Smart City Technology Adoption

Press Release Published: 11/18/2015

Securing Smart Cities, the not-for-profit global initiative addressing the cyber security challenges of smart cities, today released guidelines jointly developed by Securing Smart Cities and the Cloud Security Alliance (CSA) for the adoption of smart city technology. The guide provides organizati...

Cloud Security Alliance Summit Los Angeles 2015 To Feature Top Experts from Entertainment and Enterprise on Lessons Learned in Cloud Security

Press Release Published: 11/17/2015

Speakers from The Honest Company, PwC, University of Oxford, Microsoft, Google, SpaceX and Evident.io to Be Featured at the Upcoming Inaugural Event Los Angeles, CA – November 17, 2015 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awarene...

Cyber Security Lessons from “The Martian”

Blog Published: 11/16/2015

By TK Keanini, Chief Technology Officer, LancopeFirst things first, if you have not seen the movie or read the book “The Martian,” stop right now and do not continue because there will be spoilers. You have been warned.On more than one occasion in my life as a security professional, I have felt l...

CISA Threatens Privacy, Moves on Anyway

Blog Published: 11/12/2015

By Rachel Holdgrafer, Business Content Strategist, Code42The Cyber Information Sharing Act (CISA) passed in a 74-21 U.S. Senate vote last week. Critics of CISA say the bill will allow the government to collect sensitive personal data unchecked. Civil liberty, privacy groups, leading technology co...

Upcoming Webinars on Safe Harbor and CASB Capabilities

Press Release Published: 11/10/2015

CloudBytes webinar series is dedicated to educating the public on all things related to the cloud and next generation IT. We have two exciting webinars coming up: Can I Still Use the Cloud? Now that Safe Harbor is Dead Presented by Nigel Hawthorn of Skyhigh Nov 24th--6:00am PT (2:00pm GMT) The...

Enterprise Data Breaches on the Rise Despite Infosec Policies

Blog Published: 11/06/2015

By Rachel Holdgrafer, Business Content Strategist, Code42The results of the 2014 Protiviti IT Security and Privacy Survey reports that:• 77% of organizations have a password policy or standard.• 67% of organizations have a data production and privacy policy.• 67% of organizations have an infor...

Keep your Data and Applications Safe from CSA Top Threats

Press Release Published: 11/04/2015

The cloud presents all kinds of opportunities for today’s enterprise, from anywhere access to anything-as-a-service. Cloud computing imposes significant security risks on the corporation, network, IT and the day to day activities of the business. How do they maintain compliance, control and owner...

CSA Guidance V.4: Domain 1 now available for review and comments

Press Release Published: 11/04/2015

The Cloud Security Alliance's Security Guidance for Critical Areas of Focus in Cloud Computing seeks to establish a stable, secure baseline for cloud operations. It acts as a practical, actionable roadmap to individuals looking to safely and securely adopt the cloud paradigm. Since it's last rev...

Eleven Essential Findings from Skyhigh’s Q4 2015 Cloud Report

Blog Published: 11/04/2015

Our Latest Research Reveals Opportunities and Threats As Business-Critical Data Moves to the CloudBy Cameron Coles, Sr. Product Marketing Manager, Skyhigh Networks Cloud services are now an integral part of corporate life. Companies use, on average, 1,154 cloud services ranging from enterprise-...

Five Tips for Not Becoming an Insider Threat

Blog Published: 10/30/2015

By Andrew Wild, Chief Information Security Officer, LancopeMost employees are honest, trustworthy people that would not steal from their employer or intentionally take sensitive, private information from their job and sell it. But many well-meaning employees are taken advantage of by attackers to...

The Blind Spot of Insider Threat

Blog Published: 10/29/2015

By Paul Calatayud, Guest Blogger, Code42Security threats from inside the organization are increasing, but too many organizations hesitate to address the issue. They’re afraid that monitoring employee behavior implies they don’t trust employees. Today, the reality is that employees are often unint...

Spread the Message Beyond the Experts

Blog Published: 10/28/2015

By Andrew Wild, Chief Information Security Officer, LancopeOctober is National Cyber Security Awareness Month. But if you’re reading this blog, chances are good that you are an experienced information security professional and that you’re focused on awareness every month! So, how do you explain s...

Looking for the CCM?

Start using the Cloud Controls Matrix to simplify compliance with multiple standards & regulations.