Cloud 101CircleEventsBlog

All Articles

All Articles
What’s a CASB? Gartner Report Outlines Use Cases, Architecture, and Evaluation Criteria

Blog Published: 09/29/2015

By Cameron Coles, Sr. Product Marketing Manager, Skyhigh NetworksGiven the explosive growth of cloud computing and numerous high-profile security and compliance incidents, it’s not surprising that surveys of IT leaders find that cloud tops the list of security priorities this year. In its latest ...

AV Can’t Stop Zero-Day Attacks and They’re Hurting Productivity

Blog Published: 09/22/2015

By Susan Richardson, Manager/Content Strategy, Code42It’s been almost 18 months since Symantec officially declared antivirus software “dead” in an interview with the Wall Street Journal. So why did a recent study by ESG find that 73 percent of enterprises have at least two AV products deployed an...

How Uber Uses the Cloud to Drive a Mobile Workforce

Press Release Published: 09/16/2015

Oceans of ink have already been spilled extolling Uber’s innovative practices and growing profits, but here’s one aspect getting less attention: How the company’s nearly 100 percent cloud-based business empowers its vast network of mobile workers (the drivers)... Read blog post

What’s Hindering the Adoption of Cloud Computing in Europe?

Press Release Published: 09/15/2015

As with their counterparts in North America, organizations across Europe are eagerly embracing cloud computing into their operating environment. However, despite the overall enthusiasm around the potential of cloud computing to transform their business practices, many CIOs have real concerns abou...

Four criteria for legal hold of electronically stored information (ESI)

Blog Published: 09/09/2015

By Chris Wheaton, Privacy and Compliance Counsel, Code42The average enterprise sees its data double every 14 months — nearly one-third of which is stored on endpoints, such as laptops and mobile devices. This rapid growth in electronically stored information (ESI) creates new challenges and drive...

Info security: an eggshell defense or a layer cake strategy

Blog Published: 09/02/2015

By Susan Richardson, Manager/Content Strategy, Code42Eggshell security describes a practice in which organizations depend on a traditional model of a “hardened outer layer of defenses and a network that is essentially wide open, once the attacker has made it past perimeter defenses.”In an article...

M&A Concern: Is your data walking out the door with employees?

Blog Published: 08/25/2015

By Susan Richardson, Manager/Content Strategy, Code42 If you’re at one of the 40,000+ companies a year worldwide that announce a merger or acquisition, your biggest worry may not be combining IT systems. It may be all those employees walking out the door with your data.Layoffs and voluntary d...

The Cloud and Cybersecurity

Blog Published: 08/20/2015

By Vibhav Agarwal, Senior Manager of Product Marketing, MetricStreamTomorrow’s digital enterprise is at war today. War not only with external cybersecurity hackers and viruses, but also within the organization itself – a conclusion based on my discussions with information security managers and cl...

MITRE Matrix: Going on the ATT&CK

Blog Published: 08/19/2015

By TK Keanini, Chief Technology Officer, LancopeMost cybersecurity work is geared towards finding ways to prevent intrusions – passwords, two-factor authentication, firewalls, to name a few – and to identify the “chinks in the armor” that need to be sealed. The characteristics of malware are shar...

How to create the perfect climate for endpoint data migration

Blog Published: 08/18/2015

By Andy Hardy, EMEA Managing Director, Code42Today’s enterprise organizations face an escalating problem. As the use of laptops, tablets and smartphones continues to grow, the amount of data created and stored on these endpoint devices is increasing at pace.In fact, typically half of an organizat...

Trusting the Cloud: A Deeper Look at Cloud Computing Market Maturity

Blog Published: 08/12/2015

By Frank Guanco, Research Project Manager, CSADue to its exponential growth in recent years, cloud computing is no longer considered an emerging technology. Cloud computing, however, cannot yet be considered a mature and stable technology. Cloud computing comes with both the benefits and the draw...

What is Quantum Key Distribution?

Blog Published: 08/11/2015

By Frank Guanco, Research Project Manager, CSAFollowing this year’s RSA Conference, the Cloud Security Alliance formed a new working group called the Quantum-Safe Security Working Group (QSSWG). The QSSWG working group recently published a follow-up paper entitled “What is Quantum-Safe Computing”...

What is Quantum Key Distribution?

Press Release Published: 08/11/2015

“What is Quantum Key Distribution” addresses the issues around sharing and securing encryption keys in a quantum world. The position paper provides an overview of key distribution in general, examines some of current approaches and existing challenges of key distribution, and provides a brief ove...

Are endpoints the axis of evil or the catalyst of creation?

Blog Published: 08/11/2015

By Dave Payne, Vice President of Systems Engineering, Code42 If security pros had their way, they’d make laptops so secure they’d be virtually unusable. Protecting against every imaginable attack–not to mention the fallibility of the human connected to the laptop–is a battle we keep losing. S...

Private cloud deployments don’t own the monopoly on data security

Blog Published: 08/04/2015

By Aimee Simpson, Integrated Marketing Manager, Code42A recent Cloud Security Alliance (CSA) survey shows 73 percent of respondents cited security as a top challenge to cloud adoption for the enterprise.For this reason, the enterprise majority still requires on-premises, private cloud deployments...

IT and the Line of Business – Security vs Usability Survey

Press Release Published: 07/31/2015

The undeniable benefits of the cloud – better functionality, scalability, availability, and innovation at lower cost – is driving a secular move to cloud services. These benefits have made the cloud an executive-level and board-level conversation at many companies. As a result, IT is looking to t...

Effective Access Control with Active Segmentation

Blog Published: 07/30/2015

By Scott Block, Senior Product Marketing Manager, LancopeAs the threat landscape has evolved to include adversaries with deep pockets, immense resources and plenty of time to compromise their intended target, security professionals have been struggling to stave off data breaches. We’ve all heard ...

Why 87.3% of Companies Use Office 365

Blog Published: 07/29/2015

The Surprising Numbers Behind Office 365 Benefits and RisksBy Cameron Coles, ‎Senior Product Marketing Manager, Skyhigh NetworksBy all accounts, Office 365 is a huge success for Microsoft and its customers. In the quarter that ended June 30, 2015, Microsoft’s commercial cloud revenue grew 88% to ...

Evaluate Cloud Security Like Other Outsourced IT

Blog Published: 07/28/2015

By Susan Richardson, Manager/Content Strategy, Code42Now that business cloud usage is ubiquitous, you’d think we could get past all the hype around cloud security, and just start treating the cloud like any other IT platform that needs a rigorous, well-rounded security strategy with appropriate a...

Cloud Security Alliance EMEA to Host Fourth Annual Congress

Press Release Published: 07/28/2015

Agenda and Keynote Speakers Announced for Premiere European Cloud Security Event Berlin, Germany – July 28, 2015 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment...

Looking for the CCM?

Start using the Cloud Controls Matrix to simplify compliance with multiple standards & regulations.