Cloud Computing: A Little Less Cloudy
Blog Published: 05/16/2016
By Christina McGhee, Manager/FedRAMP Technical Lead, SchellmanToday, consumers have an increasing interest in implementing cloud solutions to process and store their data. They are looking to take advantage of the benefits provided by cloud computing, including flexibility, cost savings, and avai...
Providing Trust and Assurance Through Cloud Certification and Attestation: A Complimentary CSA STAR Program Webinar by Schellman
Blog Published: 05/12/2016
By Avani Desai, Executive Vice President, SchellmanIn the last 24 months, the Cloud Security Alliance (CSA) has made great strides in enhancing their CSA Security, Trust and Assurance Registry (STAR) Program. In brief, the STAR Program is a publicly available registry designed to recognize assur...
Outdated Privacy Act Close to Getting an Upgrade
Blog Published: 05/12/2016
By Susan Richardson, Manager/Content Strategy, Code42The outdated Electronic Communications Privacy Act (ECPA) may finally get a much-needed upgrade, but the reform can’t come soon enough for Microsoft, other cloud providers and privacy advocates. Here’s what you need to know:The issues:The ECPA ...
How to Reduce Costs and Security Threats Using Two Amazon Tools
Blog Published: 05/10/2016
By David Lucky, Director of Product Management, DatapipeHave you ever gone to see a movie that would have been amazing if not for one person? The plot was engaging, the dialogue was well-written, and there were strong performances from most of the cast. But there was just that one actor who simpl...
DoD Updates Government Security Requirements for Cloud, But What Does That Really Mean?
Blog Published: 05/06/2016
By Brian Burns, Bid Response Manager/Government Affairs, DatapipeIT officials from the Department of Defense (DoD) have released an update to the Cloud Computing Security Requirements Guide (CC SRG), which establishes security requirements and other criteria for commercial and non-Defense Departm...
Five Endpoint Backup Features That Help Drive Adoption
Blog Published: 05/03/2016
By Susan Richardson, Manager/Content Strategy, Code42If you’re among the 28 percent of enterprises that still haven’t implemented a planned endpoint backup system, here are 5 key attributes to look for in a system, to help drive adoption and success. These recommendations are courtesy of Laura Du...
Cloud Security Alliance Announces World Class Speaker Line Up for Second Annual Federal Summit
Press Release Published: 04/28/2016
Program to Feature Insights and Perspectives into the Federal Government Cloud Strategy and Use of Cloud Services along with Best Practices to Ensure Cloud Security in Regulatory Environments Washington, DC – April 28, 2016 – The Cloud Security Alliance (CSA) today announced a world-class line u...
10 Key Questions to Answer Before Upgrading Enterprise Software
Blog Published: 04/27/2016
By Rachel Holdgrafer, Business Content Strategist, Code42The evolution of software has made possible things we never dreamed. With software upgrades come new competencies and capabilities, better security, speed, power and often disruption. Whenever something new enters an existing ecosystem, it ...
Survey of IT Pros Highlights Lack of Understanding of SaaS Data Loss Risks
Blog Published: 04/26/2016
By Melanie Sommer, Director of Marketing, Spanning by EMCRecently, Spanning – an EMC company and provider of backup and recovery for SaaS applications – announced the results of a survey* of over 1,000 IT professionals across the U.S. and the U.K. about trends in SaaS data protection. It turns ou...
Cloud Security Alliance Announces Speakers and Presentations for Upcoming SecureCloud 2016 Conference
Press Release Published: 04/25/2016
Leaders from Intel, Microsoft, Forrester Research and NIST Among Presenters at Upcoming Premiere European Cloud Security Event DUBLIN, IRELAND – April 25, 2016 – The Cloud Security Alliance (CSA), in collaboration with Fraunhofer FOKUS and ENISA, today announced the presentations and speaker lin...
Can a CASB Protect You From the Treacherous 12?
Blog Published: 04/25/2016
By Ganesh Kirti, Founder and CTO, PalerraMany frequently asked questions related to cloud security have included concerns about compliance and insider threats. But lately, a primary question is whether cloud services are falling victim to the same level of external attack as the data center. With...
NEW! Mitigating Risk for Cloud Apps Survey.
Press Release Published: 04/22/2016
Time: 15 minutes Prizes: 10 CCSK Tokens Closing Date: May 23rd Participate Now Abstract: Current state of SaaS security - with several years of cloud adoption in many organizations, approaches to security have been evolving rapidly. The purpose of this survey is to look at the specific concern...
The Panama Papers, Mossack Fonseca and Security Fundamentals
Blog Published: 04/21/2016
By Matt Wilgus, Practice Director, SchellmanThe release of details contained in the Panama Papers will be one of the biggest news stories of the year. The number of high-profile individuals implicated will continue to grow as teams comb through the 11.5 million documents leaked from Mossack Fonse...
Cloud Security Alliance to Offer CCSK ‘Train the Trainer’ Course in Milan
Press Release Published: 04/21/2016
Three-day course to be held in conjunction with Cloud Security Summit 2016 The Cloud Security Alliance (CSA) is pleased to announce that it will host its CCSK Train the Trainer course in Milan (May 17 and 18-19) at the ITWAY Academy as part of the Cloud Security Summit 2016. Conducted by recogni...
Open Peer Review: Cloud Data Center Security Working Group Charter
Press Release Published: 04/20/2016
The Cloud Security Alliance would like to invite you to review and comment on a proposed Cloud Data Center Security Working Group Charter. The focus of the Cloud Data Center Security working group is to develop and maintain a research portfolio providing capabilities to assist the cloud provider ...
May the Fourth Be with EU
Blog Published: 04/20/2016
Data Privacy Gets a Stronger Light SaberBy Nigel Hawthorn, EMEA Marketing Director, Skyhigh NetworksOn April 14, 2016, the EU Parliament passed the long-awaited new EU rules for personal data protection (GDPR). Everyone who holds or processes data on individuals in the 28 countries of the EU has ...
CloudBytes Webinars in May
Press Release Published: 04/20/2016
We have several interesting webinars coming up in May! Meeting international requirements and leveraging CSA STAR for supply chain management John DiMaria of BSI May 4th--10am PST https://www.brighttalk.com/webcast/10415/197749 Improve CX, Productivity, Revenues and Security with Identity Coher...
WP29: Thumbs Down to Draft EU-US Privacy Shield
Blog Published: 04/20/2016
By Françoise Gilbert,Global Privacy and Cybersecurity Attorney, Greenberg TraurigIn a 58-page opinion published April 13, 2016, the influential European Union Article 29 Working Party (WP29), which includes representatives of the data protection authorities of the 28 EU Member States, expressed ...
BYOD Stalled? Three Tips to Get It Going
Blog Published: 04/19/2016
By Susan Richardson, Manager/Content Strategy, Code42Despite some surveys that say Bring Your own Device (BYOD) is growing, the CyberEdge Group’s recently released 2016 Cyberthreat Defense Report found that enterprise BYOD programs have stalled. Only one-third of respondents this year had impleme...
Open Survey: Defeating Insider Threats
Press Release Published: 04/13/2016
We have a new survey entitled "Defeating the Insider Threat and Shoring up the Data Security Lifecycle" Participate now Time: 10-15 minutes Prizes: 5 CCSK Tokens Goal of the Survey: Everything we know about defeating the insider threat seems not to be solving the problem. In fact, evidence fr...