Cloud 101CircleEventsBlog
Master CSA’s Security, Trust, Assurance, and Risk program—download the STAR Prep Kit for essential tools to enhance your assurance!

All Articles

All Articles
Six Reasons Why Encryption Back Doors Won’t Deter Terrorists

Blog Published: 11/20/2015

By Willy Leichter, Global Director of Cloud Security, CipherCloudLast week’s tragic events in Paris, and fears over similar terrorist attacks around the world, have revived a long-standing debate. Early evidence suggests that the terrorists used a readily available encryption app to hide their pl...

Never Pay the Ransomer

Blog Published: 11/20/2015

By Rachel Holdgrafer, Business Content Strategist, Code42CryptoWall has struck again—only this time it’s nastier than before. With a redesigned ransom note and new encryption capabilities, BleepingComputer.com’s description of the “new and improved” CryptoWall 4.0 sounds more like a marketing bro...

The Numbers Behind Cloud User Error

Blog Published: 11/19/2015

By Sam Bleiberg, Corporate Communications Manager, Skyhigh NetworksIn the not-too-distant past, service providers had a tough time convincing enterprise IT departments that cloud platforms were secure enough for corporate data. Fortunately perspectives on cloud have matured, and more and more org...

Securing Smart Cities Issues Guidelines for Smart City Technology Adoption

Press Release Published: 11/18/2015

Securing Smart Cities, the not-for-profit global initiative addressing the cyber security challenges of smart cities, today released guidelines jointly developed by Securing Smart Cities and the Cloud Security Alliance (CSA) for the adoption of smart city technology. The guide provides organizati...

Cloud Security Alliance Summit Los Angeles 2015 To Feature Top Experts from Entertainment and Enterprise on Lessons Learned in Cloud Security

Press Release Published: 11/17/2015

Speakers from The Honest Company, PwC, University of Oxford, Microsoft, Google, SpaceX and Evident.io to Be Featured at the Upcoming Inaugural Event Los Angeles, CA – November 17, 2015 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awarene...

Cyber Security Lessons from “The Martian”

Blog Published: 11/16/2015

By TK Keanini, Chief Technology Officer, LancopeFirst things first, if you have not seen the movie or read the book “The Martian,” stop right now and do not continue because there will be spoilers. You have been warned.On more than one occasion in my life as a security professional, I have felt l...

CISA Threatens Privacy, Moves on Anyway

Blog Published: 11/12/2015

By Rachel Holdgrafer, Business Content Strategist, Code42The Cyber Information Sharing Act (CISA) passed in a 74-21 U.S. Senate vote last week. Critics of CISA say the bill will allow the government to collect sensitive personal data unchecked. Civil liberty, privacy groups, leading technology co...

Upcoming Webinars on Safe Harbor and CASB Capabilities

Press Release Published: 11/10/2015

CloudBytes webinar series is dedicated to educating the public on all things related to the cloud and next generation IT. We have two exciting webinars coming up: Can I Still Use the Cloud? Now that Safe Harbor is Dead Presented by Nigel Hawthorn of Skyhigh Nov 24th--6:00am PT (2:00pm GMT) The...

Enterprise Data Breaches on the Rise Despite Infosec Policies

Blog Published: 11/06/2015

By Rachel Holdgrafer, Business Content Strategist, Code42The results of the 2014 Protiviti IT Security and Privacy Survey reports that:• 77% of organizations have a password policy or standard.• 67% of organizations have a data production and privacy policy.• 67% of organizations have an infor...

Keep your Data and Applications Safe from CSA Top Threats

Press Release Published: 11/04/2015

The cloud presents all kinds of opportunities for today’s enterprise, from anywhere access to anything-as-a-service. Cloud computing imposes significant security risks on the corporation, network, IT and the day to day activities of the business. How do they maintain compliance, control and owner...

CSA Guidance V.4: Domain 1 now available for review and comments

Press Release Published: 11/04/2015

The Cloud Security Alliance's Security Guidance for Critical Areas of Focus in Cloud Computing seeks to establish a stable, secure baseline for cloud operations. It acts as a practical, actionable roadmap to individuals looking to safely and securely adopt the cloud paradigm. Since it's last rev...

Eleven Essential Findings from Skyhigh’s Q4 2015 Cloud Report

Blog Published: 11/04/2015

Our Latest Research Reveals Opportunities and Threats As Business-Critical Data Moves to the CloudBy Cameron Coles, Sr. Product Marketing Manager, Skyhigh Networks Cloud services are now an integral part of corporate life. Companies use, on average, 1,154 cloud services ranging from enterprise-...

Five Tips for Not Becoming an Insider Threat

Blog Published: 10/30/2015

By Andrew Wild, Chief Information Security Officer, LancopeMost employees are honest, trustworthy people that would not steal from their employer or intentionally take sensitive, private information from their job and sell it. But many well-meaning employees are taken advantage of by attackers to...

The Blind Spot of Insider Threat

Blog Published: 10/29/2015

By Paul Calatayud, Guest Blogger, Code42Security threats from inside the organization are increasing, but too many organizations hesitate to address the issue. They’re afraid that monitoring employee behavior implies they don’t trust employees. Today, the reality is that employees are often unint...

Spread the Message Beyond the Experts

Blog Published: 10/28/2015

By Andrew Wild, Chief Information Security Officer, LancopeOctober is National Cyber Security Awareness Month. But if you’re reading this blog, chances are good that you are an experienced information security professional and that you’re focused on awareness every month! So, how do you explain s...

Consumer IoT Security Impacts

Press Release Published: 10/27/2015

Within the CSA Internet of Things (IoT) Working Group, we are researching various topics related to securing IoT implementations within an enterprise. One of the more interesting aspects to consider on this subject is the role that consumer IoT devices play in regards to enterprise security. Rea...

The Definition of Cloud Computing

Blog Published: 10/26/2015

By Ross Spelman, Group Technical Services Manager, EspionWhat is the cloud and why should I go there?The transition to cloud services offers major opportunities for your organisation. Significant scalability, flexibility and cost-efficiency can all be achieved through the adoption of cloud-based ...

Three Ways to Improve Your Personal Cyber Safety

Blog Published: 10/23/2015

By Gavin Reid, Vice President/Threat Intelligence, LancopeFor National Cyber Security Awareness month there a couple of relatively easy-to-do things that I highly recommend if you want to improve your personal cyber safety. These important protections are easily available but not well documented....

California Leads the Way with Data Privacy Ruling

Blog Published: 10/22/2015

By Rachel Holdgrafer, Business Content Editor, Code42Should electronic communications and metadata be afforded the same legal protections as printed correspondence? The State of California thinks so.Introduced in February 2015 and signed into law on October 8, 2015, the California Electronic Comm...

EU-US Safe Harbor: Model Clauses – Not All They’re Cracked Up to Be…

Blog Published: 10/21/2015

By Willy Leichter, Global Director, Cloud Security, CipherCloudIn a recent blog post, we referred to the now defunct EU-US Safe Harbor framework as a house of straw, while comparing the European Commission (EC) Model Clauses (the theoretical replacement) to a house of sticks – better, perhaps, bu...

Looking for the CCM?

Start using the Cloud Controls Matrix to simplify compliance with multiple standards & regulations.