Cloud 101CircleEventsBlog
Master CSA’s Security, Trust, Assurance, and Risk program—download the STAR Prep Kit for essential tools to enhance your assurance!

All Articles

All Articles
Cloud Security Alliance to Host Fourth Software Defined Perimeter Hackathon; Top Prize of $10,000 up for Grabs

Press Release Published: 02/04/2016

Participants Invited to Attack Mission-Critical Cloud Application Architecture at RSA Conference; Verizon to Lead Testing Effort San Francisco, Calif. (RSA Conference Booth #S2614) – Feb. 4, 2016 - The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and rais...

Improving Data Privacy One Employee at a Time

Blog Published: 02/04/2016

By Rick Orloff, ‎Vice President and Chief Security Officer, Code 42It’s no Hallmark holiday, but here at Code42, Data Privacy Day is kind of a big deal. We think it should be a big deal for your organization, too. It’s a great chance to focus on the biggest security threat in your organization: y...

You’ve Been the Victim of a Cybercrime. Who You Gonna Call?

Blog Published: 02/02/2016

By Leo Taddeo, ‎Chief Security Officer, CryptzonePart 1 of a 2-part seriesRight now, one of the greatest challenges in the fight against cybercrime is the difficulty we have in creating a meaningful deterrent for hackers.Basically, the number of cybercriminals out there is demonstrably very larg...

What They’re Not Telling You About Global Deduplication

Blog Published: 01/29/2016

By Rachel Holdgrafer, Business Content Strategist, Code42When it comes to endpoint backup, is global deduplication a valuable differentiator?Not if data security and recovery are your primary objectives.Backup vendors that promote global deduplication say it minimizes the amount of data that must...

Early bird discount for CSA CEE Summit 2016 ends soon!

Press Release Published: 01/28/2016

We would like to invite you to the 4th CSA CEE Summit that will take place on the March 8th in Ljubljana. The event topic is Public Cloud Security - What is easy and what is missing? Summit will present practical solutions for the challenges faced when transitioning to the cloud and treating sec...

Serious Cybersecurity Challenges Ahead in 2016

Blog Published: 01/28/2016

By Phillip Marshall, Director of Product Marketing, CryptzoneBy now you’ll have settled into the New Year, looking ahead at what’s to come as we move swiftly through January. However, there are numerous unsettling predictions that mean 2016 is a year of many serious cybersecurity challenges – fr...

Open Survey: Enterprise Hybrid Cloud Security

Press Release Published: 01/26/2016

Hybrid cloud is a cloud deployment model using at least two different cloud deployment models (e.g. private, public, community). The deployments involved remain unique entities but are bound together by appropriate technology that enables interoperability, data portability and application portabi...

Open Peer Review: The Treacherous 12 - Cloud Computing Top Threats in 2016

Press Release Published: 01/23/2016

The Cloud Security Alliance would like to invite you to review and comment on the Top Threats Working Group's survey report, The Treacherous 12 - Cloud Computing Top Threats in 2016. The survey report shares findings and analysis from the Top Threats Working Group's survey from late 2015. The rev...

Open Peer Review: CCM v3.0.1 with ISO 27002/27017/27018 Candidate Mapping

Press Release Published: 01/23/2016

The Cloud Security Alliance would like to invite you to review and comment on the update to the Cloud Controls Matrix (CCM) v3.0.1. The update includes the ISO 27002/27017/27018 candidate mapping. In addition, there were minor updates that included spelling, style, and punctuation. This is your ...

2015 Breaches Show That Current Cybersecurity Measures Aren’t Enough

Blog Published: 01/22/2016

By Corey Williams, Senior Director/Product Management and Marketing, CentrifyLast year my colleague Chris Webber predicted that "Breach Headlines will Change IT Security Spend." Unfortunately the breach headlines of 2015 were even more striking than most could predict. 2015 breaches involved high...

Containers Aren’t New, But Ecosystem Growth Has Driven Development

Blog Published: 01/21/2016

By Thomas Campbell, Container World 2016Containers are getting a fair bit of hype at the moment, and February 2016 will see the first ever event dedicated to both the business and technical advantages of containers take place in Silicon Valley in the US.Here, Container World talks to Kyle Anderso...

What Is Data Deduplication and Who Cares?

Blog Published: 01/19/2016

By Rachel Holdgrafer, Business Content Strategist, Code42Data deduplication is a critical component of managing the size (and cost) of a continuously growing data store that you will hear about when you research endpoint backup. Intelligent compression or “single-instance storage” eliminates redu...

Privileged-Account Attacks Are Behind Every Major Cyber Crime

Blog Published: 01/14/2016

By Susan Richardson, Manager/Content Strategy, Code42It’s unsettling: the people most accountable for an organization’s security are those most likely to compromise it. Privileged user accounts—IT administrators, application developers and C-suite executives—have been the cause of high-profile br...

CSA Survey: 64.9% of IT Trusts the Cloud as Much or More than On-Premises Solutions

Press Release Published: 01/13/2016

Sponsored by Skyhigh Networks, New Report Highlights Shift in Strategy Around Cloud Adoption and Security Seattle, WA – January 13, 2015 – Cloud Adoption does not have to mean opening up your organization to increased security risks and threats if the right policies are in place. That’s what the...

Upcoming CloudBytes for January and February 2016

Press Release Published: 01/13/2016

Emerging Approaches in a Cloud Connected Enterprise: Containers and Microservices Presenter: Anil Karmel, Co-Founder and CEO of C2 Labs Date: Jan 28–10:30am PT (6:30 GMT) Containers such as Docker and CoreOS Rkt deliver incredible capabilities to developers and operators and are powering the De...

Cloud Security Alliance Summit 2016 Set to Kick Off RSA Conference with “Cloudifying Information Security”

Press Release Published: 01/11/2016

Star of ABC's Shark Tank and Former Commissioner of U.S. Securities and Exchange Commission to Serve as Featured Keynote Speakers at Annual Event San Francisco, CA – January 11, 2016 (RSA Conference 2016) - The Cloud Security Alliance (CSA) today announced its preliminary agenda for CSA Summit 2...

Increase in Federal Government Cyber Attacks Lays Groundwork for 2016

Blog Published: 01/11/2016

By John Sellers, Vice President/Federal, LancopeAt the end of last year, we looked back and said that 2014 was the year of high profile cyber attacks on the private sector. Target, Michaels, Sony and several healthcare companies and universities were plastered all over the news headlines. So did ...

Cloud Security Alliance Announces Formation of Australia and New Zealand Regional Coordinating Body

Press Release Published: 01/08/2016

New Body to Serve Growing Demand for Cloud Security Interest and Best Practices through Access to More Regional ActivitiesSINGAPORE – January 8, 2016 - The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure ...

Cost of Data Breach, Loss and Remediation

Blog Published: 01/07/2016

By Rachel Holdgrafer, Business Content Strategist, Code42The Ponemon Institute’s 2015 Cost of Data Breach Study: Global Analysis reported that fallout and clean up efforts associated with a data breach cost companies across the globe $3.79 million on average. In the United States, organizations p...

Five Ways Your Employees Sidestep Information Security Policies

Blog Published: 12/29/2015

By Susan Richardson, Manager/Content Strategy, Code42A good employee finds ways to overcome roadblocks and get the job done. But in the case of enterprise IT security, good employees may be your biggest threat. In fact, a recent Dell survey found that nearly seventy percent of IT professionals be...

Looking for the CCM?

Start using the Cloud Controls Matrix to simplify compliance with multiple standards & regulations.