Cloud 101CircleEventsBlog

All Articles

All Articles
Who knew? The Internet is not infinite

Blog Published: 07/22/2015

By Susan Richardson, Manager/Content Strategy, Code42 In January 2011, the world ran out of Internet addresses. Every device on the Internet—including routers, phones, laptops, game consoles, TVs, thermostats and coffeemakers—needs its own IP address to move data over the Net.When it began, i...

CISO role ranges from beat cop to boardroom

Blog Published: 07/17/2015

By Adam Best, Social Media Manager, Code42Every executive role has changed in the past decade or so, but none more than the chief information security officer. Ten years ago, if you asked someone to describe his CISO, he’d probably answer, “You mean my CIO?”Out of the server roomIn a globally-con...

The Art of (Cyber) War

Blog Published: 07/15/2015

By Chris Hines, Product Marketing Manager, Bitglass“If you know the enemy and know yourself, you need not fear the results of a hundred battles.” – Sun TzuWe are at war. Cyber criminals vs. enterprises and their security counterparts. Black Hatters vs. White Hatters. If you don’t believe it, do a...

Cloud Security Alliance Unveils Project STRATUS Research Results

Press Release Published: 07/15/2015

CSA together with elite team of researchers and practitioners demonstrate prototype tool that automates the auditing process of cloud data governance Hamilton, New Zealand, July 15, 2015 – Cloud Security Alliance® (CSA) participated in the third quarterly meeting of the STRATUS project, a six-ye...

FedRAMP and PCI – A Comparison of Scanning and Penetration Testing Requirements

Blog Published: 07/13/2015

By Matt Wilgus, Director of Security Assessment Services, BrightLineIn the last 30 days, the FedRAMP Program Management Office (PMO) has published guidance for both vulnerability scanning and penetration testing. The updated guidance comes on the heels of PCI mandating the enhanced penetration te...

93 Percent of Cloud Services in Healthcare Are Medium to High Risk

Press Release Published: 07/10/2015

Unlike surveys that ask people to self report their behavior, our report is the first data-driven analysis of how healthcare organizations are embracing cloud services to reduce IT cost, increase productivity, and improve patient outcomes. Read blog post

The heavy cost of ignoring dwell time

Blog Published: 07/09/2015

By Susan Richardson, Manager/Content Strategy, Code42 If you’re among the 44% of organizations that aren’t measuring Mean Time to Identify (MTTI), more commonly known as dwell time, then how will you know if you’re reducing it, which is a critical step to improving incident response?The avera...

Bridging The Chasm Between Business and IT – The GRC Way

Blog Published: 07/06/2015

By Rajesh Raman, Vice President, Zaplet/MetricStreamBusiness And ITIn today’s world, company operations function at two distinct levels: the business operation level and the IT infrastructure operation level. While the two functions operate independently, IT exists to support the business. Many o...

Six archetypes of insider exfiltration

Blog Published: 07/02/2015

By Susan Richardson, Manager/Content Strategy, Code42 With all the talk about insider threats and the potentially dangerous brew of nomadic employees and data-to-go, there’s no time like the present to identify behaviors that come before a data leak.Here are the top six: The Ship Jumper: Fre...

Cloud Security Open API: The Future of Cloud Security

Press Release Published: 06/29/2015

The Cloud Security Alliance launched the Cloud Security Open API Working Group with the goal to provide guidance for enterprises and cloud service providers on the operation and interoperability of cloud security functions, with a specific goal to protect PII and sensitive data across multiple cl...

CipherCloud and Cloud Security Alliance Forge Cloud Security Working Group

Press Release Published: 06/29/2015

Cloud Security Open API Working Group to standardize key data security best practices for CASB deployments San Jose, Calif., June 29, 2015 – Recognized as the fastest-growing segment of cloud security, the cloud access security broker (CASB) space is still an emerging one where standards have ye...

The Future of Cybersecurity

Blog Published: 06/23/2015

In 2013, President Obama issued an Executive Order to protect critical infrastructure by establishing baseline security standards. One year later, the government announced the cybersecurity framework, a voluntary how-to guide to strengthen cybersecurity and meanwhile, the Senate Intelligence Comm...

11 Advantages of Cloud Computing and How Your Business Can Benefit From Them

Blog Published: 06/22/2015

HOW COMPANIES USING THE CLOUD GROW 19.3% FASTER THAN THEIR COMPETITORSWhile their motivations vary, businesses of all sizes, industries, and geographies are turning to cloud services. According to Goldman Sachs, spending on cloud computing infrastructure and platforms will grow at a 30% compound ...

The Cloud Security Alliance (CSA) has opened the call for papers for the 2015 CSA APAC Congress

Press Release Published: 06/18/2015

The 2015 CSA APAC Congress will be held December 1st-3rd in Guangzhou, China CSA APAC Congress is the premium event for compelling presentations and interesting discussions about research, development, practice and trends related to cloud security. Attendees represent end-user, research and indu...

6 Security Tips From the Gartner Security & Risk Management Summit

Blog Published: 06/18/2015

Posted by Christopher HinesAs I was sitting in the Gartner Keynote session here at Gartner's Security & Risk Management Summit, listening to the analysts speak about what's necessary for greater enterprise security, it became clear that one word was ever-present in each of the Gartner analys...

Cloud Security Alliance and Palo Alto Networks Release Security Considerations for Private vs. Public Clouds

Blog Published: 06/17/2015

By Larry Hughes, Research Analyst, Cloud Security AllianceCloud computing has the potential to enhance collaboration, agility, scale and availability, and provides opportunities for cost reduction through optimized and efficient computing. The cloud trend presents a momentous opportunity to rev...

Cloud Security Alliance Expands Star Provider Certification Into China

Press Release Published: 06/14/2015

Called CSA C-STAR Assessment, program brings increased security assurance to cloud service providers in the Greater China area based upon CSA global best practices; adoption already underway Guangzhou, CHINA, June 15, 2015 – The Cloud Security Alliance® (CSA) today announced the launch of CSA C-...

Google leads the way out of the castle to the cloud

Blog Published: 06/11/2015

By Mike Recker, Manager - Corporate Systems Engineers, Code42Traditional IT infrastructure is built to centralize data and prevent intrusion. Like a bank vault or a defended castle in medieval times, valuables are kept in one repository and fortified to keep intruders out. In this scenario, the q...

Three Quick Cloud Security Wins for Enterprise IT

Blog Published: 06/10/2015

By Krishna Narayanaswamy, Chief Scientist, NetskopeToday we released our Cloud Report for Summer 2015 – global as well as Europe, Middle East and Africa versions. Whereas in prior reports, we shared our top findings about usage, activities, and policy violations across enterprises’ cloud apps, in...

Call for Volunteers: Security Guidance for Critical Areas of Focus in Cloud Computing

Press Release Published: 06/08/2015

The Cloud Security Alliance’s (CSA) Security Guidance for Critical Areas of Focus leverages the CSA Cloud Control Matrix and seeks to establish a stable, secure baseline for cloud operations. It acts as a practical, actionable road map to individuals looking to safely and securely adopt the cloud...

Looking for the CCM?

Start using the Cloud Controls Matrix to simplify compliance with multiple standards & regulations.