SSL Vulnerabilities in Your Mobile Apps: What Could Possibly Go Wrong?
Blog Published: 09/29/2014
By Patriz Regalado, Product Marketing Manager, VenafiThe majority of people and consumers don’t usually think about security and data privacy when they log into their mobile banking app, take a photo of the check, and make a mobile deposit directly into their account. Nor do they think about secu...
Survey Opportunitiy: Cloud Adoption in the Finance Industry
Press Release Published: 09/25/2014
Due to its particular nature, financial institutions have adopted Information and Communication Technologies throughout its entire business value chain. Advanced and convenient technologies, along with the trust of customers on established institutions have induced a great adoption of very popula...
Enabling Secure Collaboration and Compliance by Mitigating Increasing Information Risks (Part 2 of 2)
Blog Published: 09/25/2014
By Robert F. Brammer, Ph.D., Chief Strategy Officer at Brainloop, Inc.In my previous post, I addressed three major trends that play an immense role in cybersecurity initiatives. These trends include the growth of digital business, information risks, and regulatory requirements. In this post, I’ll...
Worse than Heartbleed?
Blog Published: 09/24/2014
Jim Reavis, Cloud Security AllianceToday at 10am EST a vulnerability in the command shell Bash was announced (http://seclists.org/oss-sec/2014/q3/649 and http://seclists.org/oss-sec/2014/q3/650). Bash is a local shell, it doesn't handle data supplied from remote users, so no big deal right? Wrong...
Enabling Secure Collaboration and Compliance by Mitigating Increasing Information Risks (Part 1 of 2)
Blog Published: 09/24/2014
By Robert F. Brammer, Ph.D., Chief Strategy Officer at Brainloop, Inc.The growth of digital business, information risks, and regulatory requirements are major global business trends that have an immense impact on cybersecurity. These trends are prevalent throughout a broad range of industries – i...
New Cloud Security Alliance Survey Reveals Emerging International Data Privacy Challenges
Press Release Published: 09/23/2014
73% of Respondents Call for Global Consumer Bill of Rights Around Data Privacy Seattle, WA – September 23, 2014 – According to a new survey from the Cloud Security Alliance there is a growing and strong interest in harmonizing privacy laws towards a universal set of principles. Released today...
New CSA Survey Reveals Emerging International Data Privacy Challenges; Discrepancies Illustrate the Demand for Data Protection Harmonization
Blog Published: 09/23/2014
By Evelyn de Souza,Data Privacy and Compliance Leader, Cisco SystemsAccording to a new survey from Cloud Security Alliance sponsored by Cisco, there is a growing and strong interest in harmonizing privacy laws towards a universal set of principles. Findings include overwhelming support for a glob...
The Cloud Perception-Reality Gap Lives On in CSA Survey
Blog Published: 09/22/2014
by Krishna Narayanaswamy, Netskope Chief ScientistI thought we had moved beyond the cloud app perception-reality gap.Shadow IT has been a topic of much conversation in the media, at conferences, and among our customer and partner communities for the past several years. Gartner highlighted the iss...
Cloud Security Alliance Announces Annual Ron Knode Service Award Recipients
Press Release Published: 09/19/2014
Contributions from Six Dedicated Individual CSA Volunteers Recognized in Honor of the Late CSA Member and Volunteer Contributor Ron Knode San Jose, CA – CSA CONGRESS 2014 - September 19, 2014 –The Cloud Security Alliance (CSA) today announced the recipients of its third annual Ron Knode Service...
Call for Volunteers: Critical Areas of Focus in Cloud Computing/Guidance v4
Blog Published: 09/19/2014
By J.R. Santos, CSA Global Research DirectorToday at our annual CSA Congress in San Jose, we are announcing a formal recruitment effort for volunteers to help develop the next Critical Areas of Focus in Cloud Computing Guidance, version 4.This is among the most important guidance documents the CS...
CSA Hackathon On! Launches Today at CSA Congress 2014
Blog Published: 09/18/2014
Today at 9 am PT, we officially kicked off our second Hackathon, where we are inviting the most determined of hackers to break CSA’s Software Defined Perimeter.As background, the Software Defined Perimeter (SDP) is a new security concept being standardized by the Cloud Security Alliance (CSA). SD...
Cloud Security Alliance Releases New Big Data Taxonomy Report
Press Release Published: 09/18/2014
Big Data Working Group Issues Comprehensive Report to Aid Understanding and Decision Making in Big Data Technology San Jose, CA – September 18, 2014 – CSA Congress 2014 - The Cloud Security Alliance (CSA) Big Data Working Group today released the Big Data Taxonomy Report, a new guidance report ...
Financial Survey Now Open: How Cloud Is Being Used in Financial Sector
Blog Published: 09/18/2014
By J.R. Santos, Global Research Director Today at CSA Congress 2014 here in San Jose, we are announcing the opening of an important survey we hope that you will take part in. The ‘How Cloud is Being Used in the Financial Sector’ survey aims to accelerate the adoption of secure cloud services in ...
Cloud Security Alliance Survey Finds IT Professionals Underestimating How Many Cloud Apps Exist in the Business Environment
Press Release Published: 09/18/2014
San Jose, CA – September 19, 2014 – CSA Congress 2014 – In what could be called a tale of perception versus reality, the Cloud Security Alliance (CSA) today released the results of a new survey that found a significant difference between the number of cloud-based applications IT and security prof...
Data Breaches and the Multiplier Effect of Cloud Services
Blog Published: 09/17/2014
By Eduard Meelhuysen, Managing Director, EMEA, NetskopeWe have had a number of conversations lately with our customers and partners about cloud security, with a particular focus on data protection in light of a growing number of data breaches. Against a backdrop of the iCloud hack and data breach...
Call for Volunteers: Antibot Working Group Seeks Experts to Help Develop Botnet Essential Practices Guide for Cloud Providers
Blog Published: 09/17/2014
By J.R. Santos, Global Research DirectorToday at the CSA Congress 2014, we have announced a call for volunteers to help create the first CSA Botnet Essential Practices Guide for Cloud Providers. Botnets have long been a favored attack mechanism of malicious actors, with server-based bot activity ...
Learning to Love Your Security Audit
Blog Published: 09/16/2014
By Mike Pav, VP of Engineering, SpanningMost folks treat a security or compliance audit like a visit from the storm troopers: a big uncomfortable disruption to your daily life (if a visit from the Empire can indeed be considered “uncomfortable”). But it does not need to feel that way.At Spanning,...
Gartner Predicts Rise of the Digital Risk Officer
Blog Published: 09/15/2014
By Michael Piramoon, Director of Analyst Relations, AccellionThe number of devices connected to enterprise networks is skyrocketing. One reason is mobile computing. Mobile workers in the US now carry on average 3 mobile devices, according to a recent survey by Sophos. Fifteen years ago, each of t...
The Lesson from Shadow IT? Workers Want Easy-to-Use Services for Getting Work Done
Blog Published: 09/09/2014
By Hormazd Romer, Senior Director of Product Marketing, AccellionThe phrase “Shadow IT” refers to products and services used by employees without the knowledge or approval of the IT department.Shadow IT is everywhere: it can be found in just about any department of any organization. When Frost &a...
Cloud Security Alliance Congress 2014 – What’s in it for YOU?
Blog Published: 09/09/2014
Many people ask me, why should I attend the CSA Congress 2014 conference over others that seem to monopolize the month of September? This is of course a question asked by those who have never attended a CSA Congress before.Those who attended last year’s event made a point of sharing with me, and...