CASBs: A Better Approach to Cloud Encryption
Blog Published: 10/20/2015
By Anurag Kahol, Founder and CTO, Bitglass Widespread enterprise adoption of public cloud applications like Office 365 has not come without security and compliance concerns. Most cloud apps function like a black box, providing little visibility or control over the handling of sensitive data. When...
CSA releases the Cloud Trust Protocol data model and API
Press Release Published: 10/15/2015
Creating tools to support Cloud Service Providers (CSPs) transparency and assurance Thanks to the support of our peer reviewers and contributors (including the EU projects SPECS, A4Cloud and CUMULUS), we are pleased to announce the release of the CSA Cloud Trust Protocol (CTP) data model and API...
Managing Shadow IT
Blog Published: 10/14/2015
By Rachel Holdgrafer, Business Content Editor, Code42“Shadow IT,” or solutions not specified or deployed by the IT department, now account for 35 percent of enterprise applications. Research shows an increase in IT shadow spend with numbers projected to grow another 20 percent by the end of 2015....
Cloud Forensics Capability Maturity Model available for Download
Press Release Published: 10/13/2015
The Incident Management and Forensics Working Group today released its “Cloud Forensics Capability Maturity Model”, a new research report that describes a Capability Maturity Model (CMM) that can be used by both cloud consumers and Cloud Service Providers (CSPs) in assessing their process maturit...
CSA Release Cloud Forensics Capability Maturity Model Report
Blog Published: 10/12/2015
CSA’s Incident Management and Forensics Working Group today released its “Cloud Forensics Capability Maturity Model”, a new research report that describes a Capability Maturity Model (CMM) that can be used by both cloud consumers and Cloud Service Providers (CSPs) in assessing their process matur...
Survey for the CSA Top Threats to Cloud Computing 2015 report is Open
Press Release Published: 10/09/2015
The Cloud Security Alliance Top Threats Working Group is conducting a survey of global security concerns in cloud computing. This short survey asks you to rate the relevance of 13 shortlisted security concerns in cloud computing. In addition, you will be given an opportunity to comment on and pro...
Conversation with an HP Instructor: “Cyber Security is part of the job for business people today”
Blog Published: 10/09/2015
By Kelly P. Baig, Education Services Instructor, HPAre you aware of the latest trends in cyber-security attacks and the tactics used by bad actors to exploit your security weak points? More importantly, have you put in place appropriate protection against these threats? One starting point as cite...
Three Killer Use Cases for Skyhigh’s New Patented Pervasive Cloud Control
Blog Published: 10/09/2015
By Kamal Shah, SVP, Products and Marketing, Skyhigh NetworksIf cloud services were used only by employees who worked from the office, on company-issued devices, enforcing cloud policies would be straight-forward. IT Security would simply direct all traffic, for all employees, across all cloud ser...
CSA Congress at PSR 2015 Recap Roundup
Blog Published: 10/07/2015
By Frank Guanco, Research Project Manager, CSA GlobalLast week, the CSA Congress and IAPP Privacy Academy teamed up in Las Vegas, Nevada for the Privacy.Security.Risk. (PSR) conference. This was the second privacy and security conference that the Cloud Security Alliance (CSA) and the Internationa...
The Web’s Greediest Villain: Ransomware
Blog Published: 10/07/2015
By Aimee Simpson, Integrated Marketing Manager, Code42President Obama designated October as National Cyber Security Awareness Month (NCSAM). This U.S. observance is meant to engage, educate and raise awareness of the importance of cybersecurity to our nation. This month, Code42 is celebrating wi...
What Is Post-Quantum Cryptography?
Press Release Published: 10/06/2015
Post-quantum cryptography refers to the different classes of new cryptographic algorithms that are currently believed to resist quantum computer attacks. The most pressing issue today is these cryptographic algorithms need to be proactively in place several years before quantum computers are ava...
Fall 2015 Netskope Cloud Report: Healthcare and Life Sciences Have the Most Violations
Blog Published: 10/06/2015
By Krishna Narayanaswamy, Co-founder and Chief Scientist, NetskopeToday we released our Cloud Report for Fall 2015 – global as well as and Europe, Middle East and Africa versions. Each quarter we report on aggregated, anonymized findings such as top used apps, top activities, and top policy viola...
Cloud Security Alliance CEO’s Top Cloud Security Priorities
Blog Published: 10/02/2015
By Jim Reavis, CEO, Cloud Security Alliance.I would like to thank my friends at Code42 for again giving me a platform to talk about the cloud security issues on my mind. In this blog post, I wanted to discuss some of the changes I am seeing in how security professionals are rethinking best practi...
Cloud Security Alliance Releases New Guidance for Identity and Access Management for the Internet of Things
Press Release Published: 09/30/2015
Internet of Things (IOT) Working Group Provides Easily Understandable Recommendations for Securely Implementing and Deploying IoT Solutions Las Vegas, NV – CSA Congress 2016 -- Sept 30, 2015 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising a...
Cloud Security Alliance Announces Annual Ron Knode Service Award Recipients
Press Release Published: 09/30/2015
Contributions from Six Dedicated Individual CSA Volunteers Recognized in Honor of the Late CSA Member and Volunteer Contributor Ron Knode LAS VEGAS, NV – CSA CONGRESS 2015 - September 30, 2015 – The Cloud Security Alliance (CSA) today announced the recipients of its fourth annual Ron Knode Servi...
What’s a CASB? Gartner Report Outlines Use Cases, Architecture, and Evaluation Criteria
Blog Published: 09/29/2015
By Cameron Coles, Sr. Product Marketing Manager, Skyhigh NetworksGiven the explosive growth of cloud computing and numerous high-profile security and compliance incidents, it’s not surprising that surveys of IT leaders find that cloud tops the list of security priorities this year. In its latest ...
AV Can’t Stop Zero-Day Attacks and They’re Hurting Productivity
Blog Published: 09/22/2015
By Susan Richardson, Manager/Content Strategy, Code42It’s been almost 18 months since Symantec officially declared antivirus software “dead” in an interview with the Wall Street Journal. So why did a recent study by ESG find that 73 percent of enterprises have at least two AV products deployed an...
How Uber Uses the Cloud to Drive a Mobile Workforce
Press Release Published: 09/16/2015
Oceans of ink have already been spilled extolling Uber’s innovative practices and growing profits, but here’s one aspect getting less attention: How the company’s nearly 100 percent cloud-based business empowers its vast network of mobile workers (the drivers)... Read blog post
What’s Hindering the Adoption of Cloud Computing in Europe?
Press Release Published: 09/15/2015
As with their counterparts in North America, organizations across Europe are eagerly embracing cloud computing into their operating environment. However, despite the overall enthusiasm around the potential of cloud computing to transform their business practices, many CIOs have real concerns abou...
Four criteria for legal hold of electronically stored information (ESI)
Blog Published: 09/09/2015
By Chris Wheaton, Privacy and Compliance Counsel, Code42The average enterprise sees its data double every 14 months — nearly one-third of which is stored on endpoints, such as laptops and mobile devices. This rapid growth in electronically stored information (ESI) creates new challenges and drive...