CSA Establishes Quantum-Safe Security Working Group and Releases What is Quantum-Safe Security Position Paper
Blog Published: 05/28/2015
By Frank Guanco, Research Analyst, CSAConsider this scenario: A CIO at a Fortune 500 company receives a call from a reporter asking how the company is responding to the announcement of the new commercially available quantum computer that can “break” RSA and Elliptic Curve Cryptography (ECC). This...
What is Quantum-Safe Security?
Press Release Published: 05/28/2015
The Quantum-Safe Security working group released a position paper titled ‘What is Quantum-Safe Security?’ The document examines the need for a proactive defense against a multi-purpose quantum computer. Read blog post
Who’s backing up BYOD data? One more reason for cloud disaster recovery
Press Release Published: 05/28/2015
If you’re among the 60% of organizations that don’t have a disaster recovery plan, or among the 59% that only back up data in one location, here are 5 good reasons to shore up your plan and include the cloud as one of your endpoint backup solutions... Read blog post
Healthcare Duped By “Spellcheck” Phishing Attack Again?
Press Release Published: 05/25/2015
The “Spellcheck” phishing attack may very well be the most advanced spear phishing attack the world has ever seen. Playing off of human error makes preventing breaches/limiting the damage a people problem, just as much as it is a security technology gap. Read blog post
Cloud Security Alliance Launches New Asia-Pacific Education Council
Press Release Published: 05/25/2015
Group Holds Kick-Off Meeting to Finalize Charter and Outline Upcoming Initiatives SINGAPORE – May 25, 2015 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment, toda...
Governance, Risk, Compliance and Cloud: A Fresh Look at Benefits, Value Proposition
Blog Published: 05/22/2015
By Nanda Ramanujam, Director of GRC Solutions/PS-North America, MetricStreamToday’s world is undergoing phenomenal and unprecedented change. From political chaos and economic volatility, to great strides in the fields of science and technology, to an increasingly savvy and global workforce. All o...
LogJam Exposed: 575 Cloud Services Potentially Vulnerable to Man-in-the-Middle Attacks
Blog Published: 05/21/2015
By Sekhar Sarukkai, VP of Engineering, Skyhigh NetworksLogJam, the latest in a spate of web vulnerabilities, was exposed on Tuesday evening by a team including Mathew Green, assistant research professor at Johns Hopkins University, experts from University of Michigan and the University of Pennsyl...
Lifehack: 4 Things to Stop Doing When It Comes to O365 Security
Blog Published: 05/20/2015
By Chris Hines, Product Marketing Manager, BitglassI’m sure you have read a million blogs about what you should be doing when it comes to achieving security for cloud applications like Office 365. I know because admittedly I have written some of them myself. But an idea came to me yesterday as I ...
Balancing IT Risk and Opportunity
Blog Published: 05/13/2015
By David Williamson, CISSP, CGEIT, CRISC, Vice President - Professional Services, MetricStreamFor business managers, moving portions of our company’s most valued information assets into the public cloud, while compelling economically, raises a thicket of difficult risk and compliance questions. ...
HIPAA-Compliant BYOD After the Honeymoon
Blog Published: 05/11/2015
By Nat Kausik, CEO, BitglassWe met with the head of compliance of a large state healthcare organization last week. They were struggling with achieving HIPAA compliant mobility and shared their experiences and insights with us.To start, mobile technologies are changing so rapidly that any attempt ...
CSA Releases New Whitepaper on Virtualization Security Best Practices
Press Release Published: 05/07/2015
The CSA's Virtualization working group released a whitepaper entitled: “Best Practices for Mitigating Risks in Virtualized Environments” which provides guidance on the identification and management of security risks specific to compute virtualization technologies that run on server hardware. Rea...
The Top 10 Cloud Services in Government That Don’t Encrypt Data at Rest
Blog Published: 05/07/2015
By Cameron Coles, Sr. Product Marketing Manager, Skyhigh NetworksSensitive data in the cloud is more widespread than you may think. Analyzing cloud usage for 15 million users, Skyhigh found that 22% of documents uploaded to file sharing services contained sensitive data such as personally identif...
CSA Launches Best Practices for Mitigating Risks in Virtualized Environments
Press Release Published: 05/06/2015
At this year’s RSA Conference, the Cloud Security Alliance released a new whitepaper entitled: “Best Practices for Mitigating Risks in Virtualized Environments” which provides guidance on the identification and management of security risks specific to compute virtualization technologies that run ...
CSA CloudBytes: May Webcast
Press Release Published: 05/06/2015
The Cloud Security Alliance CloudBytes webinar series is dedicated to educate the industry on the latest trends and topics in cloud computing. From regulation and risk in the cloud to the latest topics in IoT and data protection and privacy, we've reached thousands with our messages from top indu...
Cloud Security Alliance Releases Candidate Mapping of FedRAMP Security Controls
Press Release Published: 05/05/2015
At the Cloud Security Alliance Federal Summit, the CSA announced the release of the Candidate Mapping V4 of the FedRAMP security controls to version 3.0.1 of the CSA Cloud Controls Matrix (CCM). The FedRAMP controls are based on the National Institute of Standards and Technology (NIST) Special Pu...
3 Things Startups Need to Know to Move to the Cloud
Blog Published: 05/05/2015
By Shellye Archambeau, CEO, MetricStreamDespite concerns around data security, businesses are optimistic about the cloud. In fact, software-as-a-service adoption has more than quintupled from 13 percent in 2011 to 72 percent in 2014, according to a cloud computing survey conducted by North Bridge...
CSA to Hold Inaugural Federal Summit on May 5th in Washington DC
Blog Published: 05/04/2015
The CSA is excited to announce that it will be holding its inaugural Federal Summit 2015 on May 5th in Washington DC. The Cloud Security Alliance Federal Summit is a free for government event, comprised of information security professionals from civilian and defense agencies to share experiences ...
CLOUD SECURITY: HOW CAN GRC HELP?
Blog Published: 05/01/2015
By Vibhav Agarwal, Senior Manager of Product Marketing, MetricStreamAn integrated GRC approach to cloud acceptance, adoption and scale includes the risk perspective from the beginning. Harnessing the power of cloud security with a GRC framework can promote and improve information security practic...
White-Hat Malware
Blog Published: 04/29/2015
By Chris Hines, Product Marketing Manager, Bitglass As many of you know, we recently released the results of the first ever data tracking experiment in the Dark Web. In the “Where’s Your Data?“ experiment, we used our patent-pending watermarking technology to embed invisible trackers within a...
OPEN PEER REVIEW: Privacy Level Agreement 4 Europe V2
Press Release Published: 04/28/2015
The Cloud Security Alliance would like to invite you to review and comment on the Privacy Level Agreement 4 Europe V2. The Cloud Security Alliance published in February 2013 the “Privacy Level Agreement Outline for CSPs Providing Services in the European Union” (PLA4EU V.1). The PLA4EU V.1 should...