Cloud 101CircleEventsBlog

All Articles

All Articles
Consumer IoT Security Impacts

Press Release Published: 10/27/2015

Within the CSA Internet of Things (IoT) Working Group, we are researching various topics related to securing IoT implementations within an enterprise. One of the more interesting aspects to consider on this subject is the role that consumer IoT devices play in regards to enterprise security. Rea...

The Definition of Cloud Computing

Blog Published: 10/26/2015

By Ross Spelman, Group Technical Services Manager, EspionWhat is the cloud and why should I go there?The transition to cloud services offers major opportunities for your organisation. Significant scalability, flexibility and cost-efficiency can all be achieved through the adoption of cloud-based ...

Three Ways to Improve Your Personal Cyber Safety

Blog Published: 10/23/2015

By Gavin Reid, Vice President/Threat Intelligence, LancopeFor National Cyber Security Awareness month there a couple of relatively easy-to-do things that I highly recommend if you want to improve your personal cyber safety. These important protections are easily available but not well documented....

California Leads the Way with Data Privacy Ruling

Blog Published: 10/22/2015

By Rachel Holdgrafer, Business Content Editor, Code42Should electronic communications and metadata be afforded the same legal protections as printed correspondence? The State of California thinks so.Introduced in February 2015 and signed into law on October 8, 2015, the California Electronic Comm...

EU-US Safe Harbor: Model Clauses – Not All They’re Cracked Up to Be…

Blog Published: 10/21/2015

By Willy Leichter, Global Director, Cloud Security, CipherCloudIn a recent blog post, we referred to the now defunct EU-US Safe Harbor framework as a house of straw, while comparing the European Commission (EC) Model Clauses (the theoretical replacement) to a house of sticks – better, perhaps, bu...

CASBs: A Better Approach to Cloud Encryption

Blog Published: 10/20/2015

By Anurag Kahol, Founder and CTO, Bitglass Widespread enterprise adoption of public cloud applications like Office 365 has not come without security and compliance concerns. Most cloud apps function like a black box, providing little visibility or control over the handling of sensitive data. When...

CSA releases the Cloud Trust Protocol data model and API

Press Release Published: 10/15/2015

Creating tools to support Cloud Service Providers (CSPs) transparency and assurance Thanks to the support of our peer reviewers and contributors (including the EU projects SPECS, A4Cloud and CUMULUS), we are pleased to announce the release of the CSA Cloud Trust Protocol (CTP) data model and API...

Managing Shadow IT

Blog Published: 10/14/2015

By Rachel Holdgrafer, Business Content Editor, Code42“Shadow IT,” or solutions not specified or deployed by the IT department, now account for 35 percent of enterprise applications. Research shows an increase in IT shadow spend with numbers projected to grow another 20 percent by the end of 2015....

Cloud Forensics Capability Maturity Model available for Download

Press Release Published: 10/13/2015

The Incident Management and Forensics Working Group today released its “Cloud Forensics Capability Maturity Model”, a new research report that describes a Capability Maturity Model (CMM) that can be used by both cloud consumers and Cloud Service Providers (CSPs) in assessing their process maturit...

CSA Release Cloud Forensics Capability Maturity Model Report

Blog Published: 10/12/2015

CSA’s Incident Management and Forensics Working Group today released its “Cloud Forensics Capability Maturity Model”, a new research report that describes a Capability Maturity Model (CMM) that can be used by both cloud consumers and Cloud Service Providers (CSPs) in assessing their process matur...

Survey for the CSA Top Threats to Cloud Computing 2015 report is Open

Press Release Published: 10/09/2015

The Cloud Security Alliance Top Threats Working Group is conducting a survey of global security concerns in cloud computing. This short survey asks you to rate the relevance of 13 shortlisted security concerns in cloud computing. In addition, you will be given an opportunity to comment on and pro...

Conversation with an HP Instructor: “Cyber Security is part of the job for business people today”

Blog Published: 10/09/2015

By Kelly P. Baig, Education Services Instructor, HPAre you aware of the latest trends in cyber-security attacks and the tactics used by bad actors to exploit your security weak points? More importantly, have you put in place appropriate protection against these threats? One starting point as cite...

Three Killer Use Cases for Skyhigh’s New Patented Pervasive Cloud Control

Blog Published: 10/09/2015

By Kamal Shah, SVP, Products and Marketing, Skyhigh NetworksIf cloud services were used only by employees who worked from the office, on company-issued devices, enforcing cloud policies would be straight-forward. IT Security would simply direct all traffic, for all employees, across all cloud ser...

CSA Congress at PSR 2015 Recap Roundup

Blog Published: 10/07/2015

By Frank Guanco, Research Project Manager, CSA GlobalLast week, the CSA Congress and IAPP Privacy Academy teamed up in Las Vegas, Nevada for the Privacy.Security.Risk. (PSR) conference. This was the second privacy and security conference that the Cloud Security Alliance (CSA) and the Internationa...

The Web’s Greediest Villain: Ransomware

Blog Published: 10/07/2015

By Aimee Simpson, Integrated Marketing Manager, Code42President Obama designated October as National Cyber Security Awareness Month (NCSAM). This U.S. observance is meant to engage, educate and raise awareness of the importance of cybersecurity to our nation. This month, Code42 is celebrating wi...

What Is Post-Quantum Cryptography?

Press Release Published: 10/06/2015

Post-quantum cryptography refers to the different classes of new cryptographic algorithms that are currently believed to resist quantum computer attacks. The most pressing issue today is these cryptographic algorithms need to be proactively in place several years before quantum computers are ava...

Fall 2015 Netskope Cloud Report: Healthcare and Life Sciences Have the Most Violations

Blog Published: 10/06/2015

By Krishna Narayanaswamy, Co-founder and Chief Scientist, NetskopeToday we released our Cloud Report for Fall 2015 – global as well as and Europe, Middle East and Africa versions. Each quarter we report on aggregated, anonymized findings such as top used apps, top activities, and top policy viola...

Cloud Security Alliance CEO’s Top Cloud Security Priorities

Blog Published: 10/02/2015

By Jim Reavis, CEO, Cloud Security Alliance.I would like to thank my friends at Code42 for again giving me a platform to talk about the cloud security issues on my mind. In this blog post, I wanted to discuss some of the changes I am seeing in how security professionals are rethinking best practi...

Cloud Security Alliance Releases New Guidance for Identity and Access Management for the Internet of Things

Press Release Published: 09/30/2015

Internet of Things (IOT) Working Group Provides Easily Understandable Recommendations for Securely Implementing and Deploying IoT Solutions Las Vegas, NV – CSA Congress 2016 -- Sept 30, 2015 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising a...

Cloud Security Alliance Announces Annual Ron Knode Service Award Recipients

Press Release Published: 09/30/2015

Contributions from Six Dedicated Individual CSA Volunteers Recognized in Honor of the Late CSA Member and Volunteer Contributor Ron Knode LAS VEGAS, NV – CSA CONGRESS 2015 - September 30, 2015 – The Cloud Security Alliance (CSA) today announced the recipients of its fourth annual Ron Knode Servi...

Looking for the CCM?

Start using the Cloud Controls Matrix to simplify compliance with multiple standards & regulations.