ChaptersCircleEventsBlog
Share how your organization adapts IAM practices to AI. Take the AI Identify Risk & Readiness Survey today!

All Articles

All Articles
Has Cloud Adoption Plateaued?

Blog Published: 07/18/2014

By Brandon Cook, Director of Product Marketing, Skyhigh NetworksStatisticians are always interested when they see data that diverges from a general pattern. This is exactly what happened when we dug into the latest cloud usage data from Q2 in the recent Cloud Adoption and Risk Report (CARR).To...

Survey Finds BYOD Devices Cluttered with Mobile Apps

Blog Published: 07/21/2014

By Hormazd Romer, Senior Director of Product Marketing, AccellionHow many mobile apps are installed on BYOD devices? The answer varies from employee to employee, but broadly speaking, the answer seems to be, “lots.”IBM company Fiberlink recently surveyed mobile workers and tallied the mobiles ...

CLOUD SECURITY INNOVATORS – Q+A WITH JEFF BLAIR, CISO, CAA

Blog Published: 07/31/2014

By Brandon Cook, Director of Product Marketing, Skyhigh NetworksWe are thrilled to feature a Q+A session with Jeff Blair, CISO of Creative Artists Agency (CAA) in this month’s installment of the Cloud Security Innovators blog series. Jeff works for CAA, which represents the world’s biggest ath...

When Sharing Goes Bad

Blog Published: 07/31/2014

By Krishna Narayanaswamy, Chief Scientist, NetskopeAmong the many benefits cloud apps bring is the ability to collaborate. Key to collaboration is sharing data, findings, reports, videos, and other information assets. Whether you’re sharing the latest sales presentation, a link to a customer v...

THE 20 TOTALLY MOST POPULAR CLOUD SERVICES IN TODAY’S ENTERPRISE

Blog Published: 08/04/2014

By Brandon Cook, Director of Product Marketing, Skyhigh NetworksCIOs, CISOs, analysts, journalists, and employees alike are always curious about which cloud services are…like…the most popular and frequently used in the enterprise. This type of information is useful in that it indicates employe...

SOC 2 Examinations: Prepare for Success

Blog Published: 08/15/2014

By Stephen Halbrook, Manager, BrightLineIs your organization ready for a SOC 2 examination? Here are five steps to help successfully prepare for one: Validate the nature of the request. Does your client base understand the various SOC reporting options and what they are asking of your organiz...

In-house Counsel Should Take BYOD Risks Seriously

Blog Published: 09/03/2014

By Nina Seth, Senior Product Marketing Manager, AccellionIn many organizations, decisions about mobile technology are made primarily or exclusively by the IT and IT security departments working together.All too often, there’s one department that’s left out of these discussions: the organizati...

Dyre need to secure what matters

Blog Published: 09/08/2014

By Rajneesh Chopra, VP of Product Management, NetskopeWith the iCloud hack in the backdrop raising issues around authentication, another problem has come to the fore - this one affecting Salesforce and going by the name Dyre (alternatively Dyreza). More details are available here - http://goo....

Cloud Security Alliance Congress 2014 – What’s in it for YOU?

Blog Published: 09/09/2014

Many people ask me, why should I attend the CSA Congress 2014 conference over others that seem to monopolize the month of September? This is of course a question asked by those who have never attended a CSA Congress before.Those who attended last year’s event made a point of sharing with me, ...

The Lesson from Shadow IT? Workers Want Easy-to-Use Services for Getting Work Done

Blog Published: 09/09/2014

By Hormazd Romer, Senior Director of Product Marketing, AccellionThe phrase “Shadow IT” refers to products and services used by employees without the knowledge or approval of the IT department.Shadow IT is everywhere: it can be found in just about any department of any organization. When Frost...

Gartner Predicts Rise of the Digital Risk Officer

Blog Published: 09/15/2014

By Michael Piramoon, Director of Analyst Relations, AccellionThe number of devices connected to enterprise networks is skyrocketing. One reason is mobile computing. Mobile workers in the US now carry on average 3 mobile devices, according to a recent survey by Sophos. Fifteen years ago, each o...

Learning to Love Your Security Audit

Blog Published: 09/16/2014

By Mike Pav, VP of Engineering, SpanningMost folks treat a security or compliance audit like a visit from the storm troopers: a big uncomfortable disruption to your daily life (if a visit from the Empire can indeed be considered “uncomfortable”). But it does not need to feel that way.At Spanni...

Call for Volunteers:  Antibot Working Group Seeks Experts to Help Develop Botnet Essential Practices Guide for Cloud Providers

Blog Published: 09/17/2014

By J.R. Santos, Global Research DirectorToday at the CSA Congress 2014, we have announced a call for volunteers to help create the first CSA Botnet Essential Practices Guide for Cloud Providers. Botnets have long been a favored attack mechanism of malicious actors, with server-based bot activi...

Data Breaches and the Multiplier Effect of Cloud Services

Blog Published: 09/17/2014

By Eduard Meelhuysen, Managing Director, EMEA, NetskopeWe have had a number of conversations lately with our customers and partners about cloud security, with a particular focus on data protection in light of a growing number of data breaches. Against a backdrop of the iCloud hack and data bre...

Financial Survey Now Open: How Cloud Is Being Used in Financial Sector

Blog Published: 09/18/2014

By J.R. Santos, Global Research Director Today at CSA Congress 2014 here in San Jose, we are announcing the opening of an important survey we hope that you will take part in. The ‘How Cloud is Being Used in the Financial Sector’ survey aims to accelerate the adoption of secure cloud services ...

CSA Hackathon On! Launches Today at CSA Congress 2014

Blog Published: 09/18/2014

Today at 9 am PT, we officially kicked off our second Hackathon, where we are inviting the most determined of hackers to break CSA’s Software Defined Perimeter.As background, the Software Defined Perimeter (SDP) is a new security concept being standardized by the Cloud Security Alliance (CSA)....

Call for Volunteers: Critical Areas of Focus in Cloud Computing/Guidance v4

Blog Published: 09/19/2014

By J.R. Santos, CSA Global Research DirectorToday at our annual CSA Congress in San Jose, we are announcing a formal recruitment effort for volunteers to help develop the next Critical Areas of Focus in Cloud Computing Guidance, version 4.This is among the most important guidance documents the...

The Cloud Perception-Reality Gap Lives On in CSA Survey

Blog Published: 09/22/2014

by Krishna Narayanaswamy, Netskope Chief ScientistI thought we had moved beyond the cloud app perception-reality gap.Shadow IT has been a topic of much conversation in the media, at conferences, and among our customer and partner communities for the past several years. Gartner highlighted the ...

New CSA Survey Reveals Emerging International Data Privacy Challenges; Discrepancies Illustrate the Demand for Data Protection Harmonization

Blog Published: 09/23/2014

By Evelyn de Souza,Data Privacy and Compliance Leader, Cisco SystemsAccording to a new survey from Cloud Security Alliance sponsored by Cisco, there is a growing and strong interest in harmonizing privacy laws towards a universal set of principles. Findings include overwhelming support for a g...

Enabling Secure Collaboration and Compliance by Mitigating Increasing Information Risks (Part 1 of 2)

Blog Published: 09/24/2014

By Robert F. Brammer, Ph.D., Chief Strategy Officer at Brainloop, Inc.The growth of digital business, information risks, and regulatory requirements are major global business trends that have an immense impact on cybersecurity. These trends are prevalent throughout a broad range of industries ...

Looking for the CCM?

Start using the Cloud Controls Matrix to simplify compliance with multiple standards & regulations.