Cloud 101CircleEventsBlog
Master CSA’s Security, Trust, Assurance, and Risk program—download the STAR Prep Kit for essential tools to enhance your assurance!

All Articles

All Articles
A Perspective on the Next Big Data Breach

Blog Published: 12/23/2015

By Kevin Beaver, Guest Blogger, LancopeIn looking at the headlines and breach databases, there haven’t been any spectacular, high-visibility incidents in recent weeks. It’s almost as if the criminals are lurking in the weeds, waiting to launch their next attack during the busy, upcoming holiday s...

Code42 CSO says, “Beware the data-stealing Grinch”

Blog Published: 12/22/2015

By Rick Orloff, Chief Security Officer, Code42Historically, corporations viewed security as an overhead expense required to meet regulatory controls and audits. As we head into a new year, we know breaches are inevitable and questions about security and data protection are being asked at a higher...

Predicting Cyber Security Trends in 2016

Blog Published: 12/21/2015

By TK Keanini, Chief Technology Officer, LancopeOne of my annual rituals is to take stock of the cyber security industry and determine what trends and challenges we are likely to see in the coming year. In the ever-evolving cyberspace, technology changes on a daily basis, and attackers are always...

Smart City Security

Blog Published: 12/17/2015

By Brian Russell, Co-Chair CSA IoT Working GroupGartner defines a smart city as an “urbanized area where multiple sectors cooperate to achieve sustainable outcomes through the analysis of contextual, real time information shared among sector-specific information and operational technology systems...

Humans: Still the Weakest Link In the Enterprise Information Security Posture

Blog Published: 12/16/2015

By Rachel Holdgrafer, Business Content Strategist, Code42When it comes to protecting enterprise data, it’s more about understanding processes, procedures and the humans using the system, and less about defending the physical hardware. Seventy-eight percent of respondents to the Ponemon 2015 State...

CSA APAC and NCDRC sign Memorandum of Understanding (MOU)

Press Release Published: 12/16/2015

The Cloud Security Alliance APAC and National Cyber Defense Research Centre (NCDRC) entered into a Memorandum of Understanding (MOU) on December 12, 2015.BANGALORE – December 16, 2015 - The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awareness...

RSVP to exciting CloudBytes Webinars in January

Press Release Published: 12/15/2015

CloudBytes webinar series is dedicated to educating the public on all things related to the cloud and next generation IT. We have two exciting webinars coming up: Making Trusted Decisions to Use the Cloud: A New Model to Succeed Presenter: Jeffrey Ritter, External Lecturer, University of Oxfor...

The Twelve Days of Cyber Plunder

Blog Published: 12/14/2015

By Phillip Marshall, Director of Product Marketing, CryptzoneAs the holiday season approaches, we caution you to take heed of the cyber perils in this familiar holiday tune.While we had a little fun with the verse, this cautionary tale unfortunately rings true for many.On the first day of Christ...

CSA’s Cloud Control Matrix (CCM) Releases Minor Update to Version 3.0.1

Press Release Published: 12/11/2015

CSA’s Cloud Control Matrix (CCM) Working Group has released a series of minor updates and corrections to version 3.0.1 of its CCM. These minor updates/corrections were based on feedback from our CCM user community. A tab was created in the spreadsheet titled “CCM Change Log” to capture the detai...

CSA Releases CloudTrust Protocol Prototype Source Code

Press Release Published: 12/10/2015

Thanks to the support of our peer reviewers and contributors (including the EU projects SPECS, A4Cloud and CUMULUS), CSA is pleased to announce the release of an open-source prototype implementation of the CTP API. The Cloud Trust Protocol (CTP) is designed to be a mechanism by which cloud servi...

Fix Insider Threat with Data Loss Prevention

Blog Published: 12/10/2015

By Rachel Holdgrafer, Business Content Strategist, Code42What do the Mercedes-Benz C Class, teeth whitening strips, the Apple iPhone and personally identifiable information have in common? Each is the item most commonly stolen from its respective category: luxury cars, personal care items, smartp...

An Overview of the Security Space and What’s Needed Today

Blog Published: 12/09/2015

By Kevin Beaver, Guest Blogger, LancopeFairly often, I have friends and colleagues outside of IT and security ask me how work is going. They’re curious about the information security industry and ask questions like: How much work are you getting? Why are we seeing so many breaches? Are things goi...

Gartner’s Latest CASB Report: How to Evaluate Vendors

Blog Published: 12/07/2015

Market Guide Compares CASB Vendors And Provides Evaluation CriteriaBy Cameron Coles, Senior Product Marketing Manager, Skyhigh NetworksAs sensitive data moves to the cloud, enterprises need new ways to meet their security, compliance, and governance requirements. According to Gartner Research, “t...

The EU GDPR and Cloud: Six Must-Dos to Comply

Blog Published: 12/04/2015

By Krishna Narayanaswamy, Co-founder and Chief Scientist, NetskopeYou don’t have to be European to care about the European Commission’s pending EU General Data Protection Regulation (GDPR). Set to be adopted in 2017 and implemented the following year, carrying penalties up to 5 percent of an ente...

Network Segmentation and Its Unintended Complexity

Blog Published: 12/03/2015

By Kevin Beaver, Guest Blogger, LancopeLook at the big security regulations, i.e. PCI DSS, and any of the long-standing security principles and you’ll see that network segmentation plays a critical role in how we manage information risks today. The premise is simple: you determine where your sens...

Cloud Security Alliance Releases Mobile Application Security Testing Initiative

Press Release Published: 12/02/2015

White Paper Ready for Peer Review SINGAPORE – December 2, 2015 - The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment, today announced that its Mobile Application Secu...

Cloud Security Alliance Adds Chinese Universities to the APAC Education Council

Press Release Published: 12/02/2015

SINGAPORE – December 2, 2015 - The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment, today announced the launch of the new CSA Asia- Pacific (APAC) Education Council in...

Cloud Security Alliance Successfully hosts Cross-Straits Working Level Meeting on Cybersecurity Following Xi-Ma Meeting in Singapore

Press Release Published: 12/01/2015

SINGAPORE – December 1, 2015 - On November 7, 2015, Mr Xi Jinping, President of the People's Republic of China (PRC), and Mr Ma Ying-jeou, President of the Republic of China (ROC/Chinese Taipei), met in Singapore. The Xi-Ma meeting held in Singapore has been one of the most significant events for...

Good and Bad News on Safe Harbour: Take a Life Ring or Hold Out for a New Agreement?

Blog Published: 12/01/2015

By Susan Richardson, Manager/Content Strategy, Code42If your organization relied on the now-invalid Safe Harbour agreement to legally transfer data between the U.S. and the EU, there’s good news and bad news.The good news? The European Commission just threw you some life rings. The governing body...

More Cyber Security Lessons From “The Martian”

Blog Published: 11/23/2015

By TK Keanini, Chief Technology Officer, LancopeIn last week’s post, I covered the methodologies Mark Watney used to stay alive on the surface of Mars and how those lessons can be adapted for better cyber security back on Earth. As usual, this post will contain spoilers for The Martian, so close ...

Looking for the CCM?

Start using the Cloud Controls Matrix to simplify compliance with multiple standards & regulations.