93 Percent of Cloud Services in Healthcare Are Medium to High Risk
Press Release Published: 07/10/2015
Unlike surveys that ask people to self report their behavior, our report is the first data-driven analysis of how healthcare organizations are embracing cloud services to reduce IT cost, increase productivity, and improve patient outcomes. Read blog post
The heavy cost of ignoring dwell time
Blog Published: 07/09/2015
By Susan Richardson, Manager/Content Strategy, Code42 If you’re among the 44% of organizations that aren’t measuring Mean Time to Identify (MTTI), more commonly known as dwell time, then how will you know if you’re reducing it, which is a critical step to improving incident response?The avera...
Bridging The Chasm Between Business and IT – The GRC Way
Blog Published: 07/06/2015
By Rajesh Raman, Vice President, Zaplet/MetricStreamBusiness And ITIn today’s world, company operations function at two distinct levels: the business operation level and the IT infrastructure operation level. While the two functions operate independently, IT exists to support the business. Many o...
Six archetypes of insider exfiltration
Blog Published: 07/02/2015
By Susan Richardson, Manager/Content Strategy, Code42 With all the talk about insider threats and the potentially dangerous brew of nomadic employees and data-to-go, there’s no time like the present to identify behaviors that come before a data leak.Here are the top six: The Ship Jumper: Fre...
Cloud Security Open API: The Future of Cloud Security
Press Release Published: 06/29/2015
The Cloud Security Alliance launched the Cloud Security Open API Working Group with the goal to provide guidance for enterprises and cloud service providers on the operation and interoperability of cloud security functions, with a specific goal to protect PII and sensitive data across multiple cl...
CipherCloud and Cloud Security Alliance Forge Cloud Security Working Group
Press Release Published: 06/29/2015
Cloud Security Open API Working Group to standardize key data security best practices for CASB deployments San Jose, Calif., June 29, 2015 – Recognized as the fastest-growing segment of cloud security, the cloud access security broker (CASB) space is still an emerging one where standards have ye...
The Future of Cybersecurity
Blog Published: 06/23/2015
In 2013, President Obama issued an Executive Order to protect critical infrastructure by establishing baseline security standards. One year later, the government announced the cybersecurity framework, a voluntary how-to guide to strengthen cybersecurity and meanwhile, the Senate Intelligence Comm...
11 Advantages of Cloud Computing and How Your Business Can Benefit From Them
Blog Published: 06/22/2015
HOW COMPANIES USING THE CLOUD GROW 19.3% FASTER THAN THEIR COMPETITORSWhile their motivations vary, businesses of all sizes, industries, and geographies are turning to cloud services. According to Goldman Sachs, spending on cloud computing infrastructure and platforms will grow at a 30% compound ...
The Cloud Security Alliance (CSA) has opened the call for papers for the 2015 CSA APAC Congress
Press Release Published: 06/18/2015
The 2015 CSA APAC Congress will be held December 1st-3rd in Guangzhou, China CSA APAC Congress is the premium event for compelling presentations and interesting discussions about research, development, practice and trends related to cloud security. Attendees represent end-user, research and indu...
6 Security Tips From the Gartner Security & Risk Management Summit
Blog Published: 06/18/2015
Posted by Christopher HinesAs I was sitting in the Gartner Keynote session here at Gartner's Security & Risk Management Summit, listening to the analysts speak about what's necessary for greater enterprise security, it became clear that one word was ever-present in each of the Gartner analys...
Cloud Security Alliance and Palo Alto Networks Release Security Considerations for Private vs. Public Clouds
Blog Published: 06/17/2015
By Larry Hughes, Research Analyst, Cloud Security AllianceCloud computing has the potential to enhance collaboration, agility, scale and availability, and provides opportunities for cost reduction through optimized and efficient computing. The cloud trend presents a momentous opportunity to rev...
Cloud Security Alliance Expands Star Provider Certification Into China
Press Release Published: 06/14/2015
Called CSA C-STAR Assessment, program brings increased security assurance to cloud service providers in the Greater China area based upon CSA global best practices; adoption already underway Guangzhou, CHINA, June 15, 2015 – The Cloud Security Alliance® (CSA) today announced the launch of CSA C-...
Google leads the way out of the castle to the cloud
Blog Published: 06/11/2015
By Mike Recker, Manager - Corporate Systems Engineers, Code42Traditional IT infrastructure is built to centralize data and prevent intrusion. Like a bank vault or a defended castle in medieval times, valuables are kept in one repository and fortified to keep intruders out. In this scenario, the q...
Three Quick Cloud Security Wins for Enterprise IT
Blog Published: 06/10/2015
By Krishna Narayanaswamy, Chief Scientist, NetskopeToday we released our Cloud Report for Summer 2015 – global as well as Europe, Middle East and Africa versions. Whereas in prior reports, we shared our top findings about usage, activities, and policy violations across enterprises’ cloud apps, in...
Call for Volunteers: Security Guidance for Critical Areas of Focus in Cloud Computing
Press Release Published: 06/08/2015
The Cloud Security Alliance’s (CSA) Security Guidance for Critical Areas of Focus leverages the CSA Cloud Control Matrix and seeks to establish a stable, secure baseline for cloud operations. It acts as a practical, actionable road map to individuals looking to safely and securely adopt the cloud...
Are you missing the most versatile endpoint security tool?
Blog Published: 06/08/2015
By Aimee Simpson, Integrated Marketing Manager, Code42Lots of companies have endpoint security strategies. We know, because we’ve asked them. We’re using Backup Awareness Month to help businesses evaluate the obvious and hidden benefits of backup within a larger security plan.Hardware fails. It’s...
CSA Establishes Cloud Data Governance Working Group and Releases Governance Framework
Press Release Published: 06/04/2015
The Cloud Data Governance working group has been created to design a universal set of principles and map to emerging technologies and techniques for ensuring the privacy, confidentiality, availability, integrity and security of data across private and public clouds. Read blog post
Savvy Businesses Leverage Enterprise Cloud PaaS
Blog Published: 06/03/2015
By Rajesh Raman, Vice President/Zaplet, MetricStreamImagine a workshop full of tools: hammers, wrenches and screwdrivers. These simple tools can be used on a variety of materials: wood, brick, polymer and so on. But are these basic tools the best and enough for all materials and all projects? No,...
Cloud Security Alliance Releases New Privacy Level Agreement Guidelines to Address Personal Data Protection Compliance
Press Release Published: 06/03/2015
Powerful Self-regulatory Tool to Help Cloud Customers Better Understand and Evaluate Cloud Service Providers European Union Wide LONDON - Infosecurity Europe – June 3, 2015 - The Cloud Security Alliance (CSA) Privacy Level Agreement (PLA) Working Group today released the Privacy Level Agreement (...
CipherCloud Risk Lab Details Logjam TLS Vulnerability and Other Diffie-Hellman Weakness
Blog Published: 06/01/2015
CipherCloud Lab notifies customers that 1006 cloud applications are vulnerable to logjam and other DH weaknesses, 181 cloud applications move from a low/medium risk score to high risk category, 946 cloud applications risk scores increase.By David Berman, Director of Cloud Visibility and Security ...