Has Cloud Adoption Plateaued?
Blog Published: 07/18/2014
By Brandon Cook, Director of Product Marketing, Skyhigh NetworksStatisticians are always interested when they see data that diverges from a general pattern. This is exactly what happened when we dug into the latest cloud usage data from Q2 in the recent Cloud Adoption and Risk Report (CARR).To...
Survey Finds BYOD Devices Cluttered with Mobile Apps
Blog Published: 07/21/2014
By Hormazd Romer, Senior Director of Product Marketing, AccellionHow many mobile apps are installed on BYOD devices? The answer varies from employee to employee, but broadly speaking, the answer seems to be, “lots.”IBM company Fiberlink recently surveyed mobile workers and tallied the mobiles ...
CLOUD SECURITY INNOVATORS – Q+A WITH JEFF BLAIR, CISO, CAA
Blog Published: 07/31/2014
By Brandon Cook, Director of Product Marketing, Skyhigh NetworksWe are thrilled to feature a Q+A session with Jeff Blair, CISO of Creative Artists Agency (CAA) in this month’s installment of the Cloud Security Innovators blog series. Jeff works for CAA, which represents the world’s biggest ath...
When Sharing Goes Bad
Blog Published: 07/31/2014
By Krishna Narayanaswamy, Chief Scientist, NetskopeAmong the many benefits cloud apps bring is the ability to collaborate. Key to collaboration is sharing data, findings, reports, videos, and other information assets. Whether you’re sharing the latest sales presentation, a link to a customer v...
THE 20 TOTALLY MOST POPULAR CLOUD SERVICES IN TODAY’S ENTERPRISE
Blog Published: 08/04/2014
By Brandon Cook, Director of Product Marketing, Skyhigh NetworksCIOs, CISOs, analysts, journalists, and employees alike are always curious about which cloud services are…like…the most popular and frequently used in the enterprise. This type of information is useful in that it indicates employe...
SOC 2 Examinations: Prepare for Success
Blog Published: 08/15/2014
By Stephen Halbrook, Manager, BrightLineIs your organization ready for a SOC 2 examination? Here are five steps to help successfully prepare for one: Validate the nature of the request. Does your client base understand the various SOC reporting options and what they are asking of your organiz...
In-house Counsel Should Take BYOD Risks Seriously
Blog Published: 09/03/2014
By Nina Seth, Senior Product Marketing Manager, AccellionIn many organizations, decisions about mobile technology are made primarily or exclusively by the IT and IT security departments working together.All too often, there’s one department that’s left out of these discussions: the organizati...
Dyre need to secure what matters
Blog Published: 09/08/2014
By Rajneesh Chopra, VP of Product Management, NetskopeWith the iCloud hack in the backdrop raising issues around authentication, another problem has come to the fore - this one affecting Salesforce and going by the name Dyre (alternatively Dyreza). More details are available here - http://goo....
Cloud Security Alliance Congress 2014 – What’s in it for YOU?
Blog Published: 09/09/2014
Many people ask me, why should I attend the CSA Congress 2014 conference over others that seem to monopolize the month of September? This is of course a question asked by those who have never attended a CSA Congress before.Those who attended last year’s event made a point of sharing with me, ...
The Lesson from Shadow IT? Workers Want Easy-to-Use Services for Getting Work Done
Blog Published: 09/09/2014
By Hormazd Romer, Senior Director of Product Marketing, AccellionThe phrase “Shadow IT” refers to products and services used by employees without the knowledge or approval of the IT department.Shadow IT is everywhere: it can be found in just about any department of any organization. When Frost...
Gartner Predicts Rise of the Digital Risk Officer
Blog Published: 09/15/2014
By Michael Piramoon, Director of Analyst Relations, AccellionThe number of devices connected to enterprise networks is skyrocketing. One reason is mobile computing. Mobile workers in the US now carry on average 3 mobile devices, according to a recent survey by Sophos. Fifteen years ago, each o...
Learning to Love Your Security Audit
Blog Published: 09/16/2014
By Mike Pav, VP of Engineering, SpanningMost folks treat a security or compliance audit like a visit from the storm troopers: a big uncomfortable disruption to your daily life (if a visit from the Empire can indeed be considered “uncomfortable”). But it does not need to feel that way.At Spanni...
Call for Volunteers: Antibot Working Group Seeks Experts to Help Develop Botnet Essential Practices Guide for Cloud Providers
Blog Published: 09/17/2014
By J.R. Santos, Global Research DirectorToday at the CSA Congress 2014, we have announced a call for volunteers to help create the first CSA Botnet Essential Practices Guide for Cloud Providers. Botnets have long been a favored attack mechanism of malicious actors, with server-based bot activi...
Data Breaches and the Multiplier Effect of Cloud Services
Blog Published: 09/17/2014
By Eduard Meelhuysen, Managing Director, EMEA, NetskopeWe have had a number of conversations lately with our customers and partners about cloud security, with a particular focus on data protection in light of a growing number of data breaches. Against a backdrop of the iCloud hack and data bre...
Financial Survey Now Open: How Cloud Is Being Used in Financial Sector
Blog Published: 09/18/2014
By J.R. Santos, Global Research Director Today at CSA Congress 2014 here in San Jose, we are announcing the opening of an important survey we hope that you will take part in. The ‘How Cloud is Being Used in the Financial Sector’ survey aims to accelerate the adoption of secure cloud services ...
CSA Hackathon On! Launches Today at CSA Congress 2014
Blog Published: 09/18/2014
Today at 9 am PT, we officially kicked off our second Hackathon, where we are inviting the most determined of hackers to break CSA’s Software Defined Perimeter.As background, the Software Defined Perimeter (SDP) is a new security concept being standardized by the Cloud Security Alliance (CSA)....
Call for Volunteers: Critical Areas of Focus in Cloud Computing/Guidance v4
Blog Published: 09/19/2014
By J.R. Santos, CSA Global Research DirectorToday at our annual CSA Congress in San Jose, we are announcing a formal recruitment effort for volunteers to help develop the next Critical Areas of Focus in Cloud Computing Guidance, version 4.This is among the most important guidance documents the...
The Cloud Perception-Reality Gap Lives On in CSA Survey
Blog Published: 09/22/2014
by Krishna Narayanaswamy, Netskope Chief ScientistI thought we had moved beyond the cloud app perception-reality gap.Shadow IT has been a topic of much conversation in the media, at conferences, and among our customer and partner communities for the past several years. Gartner highlighted the ...
New CSA Survey Reveals Emerging International Data Privacy Challenges; Discrepancies Illustrate the Demand for Data Protection Harmonization
Blog Published: 09/23/2014
By Evelyn de Souza,Data Privacy and Compliance Leader, Cisco SystemsAccording to a new survey from Cloud Security Alliance sponsored by Cisco, there is a growing and strong interest in harmonizing privacy laws towards a universal set of principles. Findings include overwhelming support for a g...
Enabling Secure Collaboration and Compliance by Mitigating Increasing Information Risks (Part 1 of 2)
Blog Published: 09/24/2014
By Robert F. Brammer, Ph.D., Chief Strategy Officer at Brainloop, Inc.The growth of digital business, information risks, and regulatory requirements are major global business trends that have an immense impact on cybersecurity. These trends are prevalent throughout a broad range of industries ...