Cloud 101CircleEventsBlog

All Articles

All Articles
Are you missing the most versatile endpoint security tool?

Blog Published: 06/08/2015

By Aimee Simpson, Integrated Marketing Manager, Code42Lots of companies have endpoint security strategies. We know, because we’ve asked them. We’re using Backup Awareness Month to help businesses evaluate the obvious and hidden benefits of backup within a larger security plan.Hardware fails. It’s...

CSA Establishes Cloud Data Governance Working Group and Releases Governance Framework

Press Release Published: 06/04/2015

The Cloud Data Governance working group has been created to design a universal set of principles and map to emerging technologies and techniques for ensuring the privacy, confidentiality, availability, integrity and security of data across private and public clouds. Read blog post

Savvy Businesses Leverage Enterprise Cloud PaaS

Blog Published: 06/03/2015

By Rajesh Raman, Vice President/Zaplet, MetricStreamImagine a workshop full of tools: hammers, wrenches and screwdrivers. These simple tools can be used on a variety of materials: wood, brick, polymer and so on. But are these basic tools the best and enough for all materials and all projects? No,...

Cloud Security Alliance Releases New Privacy Level Agreement Guidelines to Address Personal Data Protection Compliance

Press Release Published: 06/03/2015

Powerful Self-regulatory Tool to Help Cloud Customers Better Understand and Evaluate Cloud Service Providers European Union Wide LONDON - Infosecurity Europe – June 3, 2015 - The Cloud Security Alliance (CSA) Privacy Level Agreement (PLA) Working Group today released the Privacy Level Agreement (...

CipherCloud Risk Lab Details Logjam TLS Vulnerability and Other Diffie-Hellman Weakness

Blog Published: 06/01/2015

CipherCloud Lab notifies customers that 1006 cloud applications are vulnerable to logjam and other DH weaknesses, 181 cloud applications move from a low/medium risk score to high risk category, 946 cloud applications risk scores increase.By David Berman, Director of Cloud Visibility and Security ...

CSA Establishes Quantum-Safe Security Working Group and Releases What is Quantum-Safe Security Position Paper

Blog Published: 05/28/2015

By Frank Guanco, Research Analyst, CSAConsider this scenario: A CIO at a Fortune 500 company receives a call from a reporter asking how the company is responding to the announcement of the new commercially available quantum computer that can “break” RSA and Elliptic Curve Cryptography (ECC). This...

What is Quantum-Safe Security?

Press Release Published: 05/28/2015

The Quantum-Safe Security working group released a position paper titled ‘What is Quantum-Safe Security?’ The document examines the need for a proactive defense against a multi-purpose quantum computer. Read blog post

Who’s backing up BYOD data? One more reason for cloud disaster recovery

Press Release Published: 05/28/2015

If you’re among the 60% of organizations that don’t have a disaster recovery plan, or among the 59% that only back up data in one location, here are 5 good reasons to shore up your plan and include the cloud as one of your endpoint backup solutions... Read blog post

Healthcare Duped By “Spellcheck” Phishing Attack Again?

Press Release Published: 05/25/2015

The “Spellcheck” phishing attack may very well be the most advanced spear phishing attack the world has ever seen. Playing off of human error makes preventing breaches/limiting the damage a people problem, just as much as it is a security technology gap. Read blog post

Cloud Security Alliance Launches New Asia-Pacific Education Council

Press Release Published: 05/25/2015

Group Holds Kick-Off Meeting to Finalize Charter and Outline Upcoming Initiatives SINGAPORE – May 25, 2015 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment, toda...

Governance, Risk, Compliance and Cloud: A Fresh Look at Benefits, Value Proposition

Blog Published: 05/22/2015

By Nanda Ramanujam, Director of GRC Solutions/PS-North America, MetricStreamToday’s world is undergoing phenomenal and unprecedented change. From political chaos and economic volatility, to great strides in the fields of science and technology, to an increasingly savvy and global workforce. All o...

LogJam Exposed: 575 Cloud Services Potentially Vulnerable to Man-in-the-Middle Attacks

Blog Published: 05/21/2015

By Sekhar Sarukkai, VP of Engineering, Skyhigh NetworksLogJam, the latest in a spate of web vulnerabilities, was exposed on Tuesday evening by a team including Mathew Green, assistant research professor at Johns Hopkins University, experts from University of Michigan and the University of Pennsyl...

Lifehack: 4 Things to Stop Doing When It Comes to O365 Security

Blog Published: 05/20/2015

By Chris Hines, Product Marketing Manager, BitglassI’m sure you have read a million blogs about what you should be doing when it comes to achieving security for cloud applications like Office 365. I know because admittedly I have written some of them myself. But an idea came to me yesterday as I ...

Balancing IT Risk and Opportunity

Blog Published: 05/13/2015

By David Williamson, CISSP, CGEIT, CRISC, Vice President - Professional Services, MetricStreamFor business managers, moving portions of our company’s most valued information assets into the public cloud, while compelling economically, raises a thicket of difficult risk and compliance questions. ...

HIPAA-Compliant BYOD After the Honeymoon

Blog Published: 05/11/2015

By Nat Kausik, CEO, BitglassWe met with the head of compliance of a large state healthcare organization last week. They were struggling with achieving HIPAA compliant mobility and shared their experiences and insights with us.To start, mobile technologies are changing so rapidly that any attempt ...

CSA Releases New Whitepaper on Virtualization Security Best Practices

Press Release Published: 05/07/2015

The CSA's Virtualization working group released a whitepaper entitled: “Best Practices for Mitigating Risks in Virtualized Environments” which provides guidance on the identification and management of security risks specific to compute virtualization technologies that run on server hardware. Rea...

The Top 10 Cloud Services in Government That Don’t Encrypt Data at Rest

Blog Published: 05/07/2015

By Cameron Coles, Sr. Product Marketing Manager, Skyhigh NetworksSensitive data in the cloud is more widespread than you may think. Analyzing cloud usage for 15 million users, Skyhigh found that 22% of documents uploaded to file sharing services contained sensitive data such as personally identif...

CSA Launches Best Practices for Mitigating Risks in Virtualized Environments

Press Release Published: 05/06/2015

At this year’s RSA Conference, the Cloud Security Alliance released a new whitepaper entitled: “Best Practices for Mitigating Risks in Virtualized Environments” which provides guidance on the identification and management of security risks specific to compute virtualization technologies that run ...

CSA CloudBytes: May Webcast

Press Release Published: 05/06/2015

The Cloud Security Alliance CloudBytes webinar series is dedicated to educate the industry on the latest trends and topics in cloud computing. From regulation and risk in the cloud to the latest topics in IoT and data protection and privacy, we've reached thousands with our messages from top indu...

Cloud Security Alliance Releases Candidate Mapping of FedRAMP Security Controls

Press Release Published: 05/05/2015

At the Cloud Security Alliance Federal Summit, the CSA announced the release of the Candidate Mapping V4 of the FedRAMP security controls to version 3.0.1 of the CSA Cloud Controls Matrix (CCM). The FedRAMP controls are based on the National Institute of Standards and Technology (NIST) Special Pu...

Looking for the CCM?

Start using the Cloud Controls Matrix to simplify compliance with multiple standards & regulations.