ChaptersEventsBlog
Get Free Early Access to TAISE Module 3! Sample the Certificate Experience Today!

All Articles

All Articles
CipherCloud Risk Lab Details Logjam TLS Vulnerability and Other Diffie-Hellman Weakness

Blog Published: 06/01/2015

CipherCloud Lab notifies customers that 1006 cloud applications are vulnerable to logjam and other DH weaknesses, 181 cloud applications move from a low/medium risk score to high risk category, 946 cloud applications risk scores increase.By David Berman, Director of Cloud Visibility and Securi...

Savvy Businesses Leverage Enterprise Cloud PaaS

Blog Published: 06/03/2015

By Rajesh Raman, Vice President/Zaplet, MetricStreamImagine a workshop full of tools: hammers, wrenches and screwdrivers. These simple tools can be used on a variety of materials: wood, brick, polymer and so on. But are these basic tools the best and enough for all materials and all projects? ...

Are you missing the most versatile endpoint security tool?

Blog Published: 06/08/2015

By Aimee Simpson, Integrated Marketing Manager, Code42Lots of companies have endpoint security strategies. We know, because we’ve asked them. We’re using Backup Awareness Month to help businesses evaluate the obvious and hidden benefits of backup within a larger security plan.Hardware fails. I...

Three Quick Cloud Security Wins for Enterprise IT

Blog Published: 06/10/2015

By Krishna Narayanaswamy, Chief Scientist, NetskopeToday we released our Cloud Report for Summer 2015 – global as well as Europe, Middle East and Africa versions. Whereas in prior reports, we shared our top findings about usage, activities, and policy violations across enterprises’ cloud apps,...

Google leads the way out of the castle to the cloud

Blog Published: 06/11/2015

By Mike Recker, Manager - Corporate Systems Engineers, Code42Traditional IT infrastructure is built to centralize data and prevent intrusion. Like a bank vault or a defended castle in medieval times, valuables are kept in one repository and fortified to keep intruders out. In this scenario, th...

Cloud Security Alliance and Palo Alto Networks Release Security Considerations for Private vs. Public Clouds

Blog Published: 06/17/2015

By Larry Hughes, Research Analyst, Cloud Security AllianceCloud computing has the potential to enhance collaboration, agility, scale and availability, and provides opportunities for cost reduction through optimized and efficient computing. The cloud trend presents a momentous opportunity to ...

6 Security Tips From the Gartner Security & Risk Management Summit

Blog Published: 06/18/2015

Posted by Christopher HinesAs I was sitting in the Gartner Keynote session here at Gartner's Security & Risk Management Summit, listening to the analysts speak about what's necessary for greater enterprise security, it became clear that one word was ever-present in each of the Gartner ana...

11 Advantages of Cloud Computing and How Your Business Can Benefit From Them

Blog Published: 06/22/2015

HOW COMPANIES USING THE CLOUD GROW 19.3% FASTER THAN THEIR COMPETITORSWhile their motivations vary, businesses of all sizes, industries, and geographies are turning to cloud services. According to Goldman Sachs, spending on cloud computing infrastructure and platforms will grow at a 30% compou...

The Future of Cybersecurity

Blog Published: 06/23/2015

In 2013, President Obama issued an Executive Order to protect critical infrastructure by establishing baseline security standards. One year later, the government announced the cybersecurity framework, a voluntary how-to guide to strengthen cybersecurity and meanwhile, the Senate Intelligence C...

Six archetypes of insider exfiltration

Blog Published: 07/02/2015

By Susan Richardson, Manager/Content Strategy, Code42 With all the talk about insider threats and the potentially dangerous brew of nomadic employees and data-to-go, there’s no time like the present to identify behaviors that come before a data leak.Here are the top six: The Ship Jumper: ...

Bridging The Chasm Between Business and IT – The GRC Way

Blog Published: 07/06/2015

By Rajesh Raman, Vice President, Zaplet/MetricStreamBusiness And ITIn today’s world, company operations function at two distinct levels: the business operation level and the IT infrastructure operation level. While the two functions operate independently, IT exists to support the business. Man...

The heavy cost of ignoring dwell time

Blog Published: 07/09/2015

By Susan Richardson, Manager/Content Strategy, Code42 If you’re among the 44% of organizations that aren’t measuring Mean Time to Identify (MTTI), more commonly known as dwell time, then how will you know if you’re reducing it, which is a critical step to improving incident response?The av...

FedRAMP and PCI – A Comparison of Scanning and Penetration Testing Requirements

Blog Published: 07/13/2015

By Matt Wilgus, Director of Security Assessment Services, BrightLineIn the last 30 days, the FedRAMP Program Management Office (PMO) has published guidance for both vulnerability scanning and penetration testing. The updated guidance comes on the heels of PCI mandating the enhanced penetration...

The Art of (Cyber) War

Blog Published: 07/15/2015

By Chris Hines, Product Marketing Manager, Bitglass“If you know the enemy and know yourself, you need not fear the results of a hundred battles.” – Sun TzuWe are at war. Cyber criminals vs. enterprises and their security counterparts. Black Hatters vs. White Hatters. If you don’t believe it, d...

CISO role ranges from beat cop to boardroom

Blog Published: 07/17/2015

By Adam Best, Social Media Manager, Code42Every executive role has changed in the past decade or so, but none more than the chief information security officer. Ten years ago, if you asked someone to describe his CISO, he’d probably answer, “You mean my CIO?”Out of the server roomIn a globally-...

Who knew? The Internet is not infinite

Blog Published: 07/22/2015

By Susan Richardson, Manager/Content Strategy, Code42 In January 2011, the world ran out of Internet addresses. Every device on the Internet—including routers, phones, laptops, game consoles, TVs, thermostats and coffeemakers—needs its own IP address to move data over the Net.When it began...

Evaluate Cloud Security Like Other Outsourced IT

Blog Published: 07/28/2015

By Susan Richardson, Manager/Content Strategy, Code42Now that business cloud usage is ubiquitous, you’d think we could get past all the hype around cloud security, and just start treating the cloud like any other IT platform that needs a rigorous, well-rounded security strategy with appropriat...

Why 87.3% of Companies Use Office 365

Blog Published: 07/29/2015

The Surprising Numbers Behind Office 365 Benefits and RisksBy Cameron Coles, ‎Senior Product Marketing Manager, Skyhigh NetworksBy all accounts, Office 365 is a huge success for Microsoft and its customers. In the quarter that ended June 30, 2015, Microsoft’s commercial cloud revenue grew 88% ...

Effective Access Control with Active Segmentation

Blog Published: 07/30/2015

By Scott Block, Senior Product Marketing Manager, LancopeAs the threat landscape has evolved to include adversaries with deep pockets, immense resources and plenty of time to compromise their intended target, security professionals have been struggling to stave off data breaches. We’ve all hea...

Private cloud deployments don’t own the monopoly on data security

Blog Published: 08/04/2015

By Aimee Simpson, Integrated Marketing Manager, Code42A recent Cloud Security Alliance (CSA) survey shows 73 percent of respondents cited security as a top challenge to cloud adoption for the enterprise.For this reason, the enterprise majority still requires on-premises, private cloud deployme...

Looking for the CCM?

Start using the Cloud Controls Matrix to simplify compliance with multiple standards & regulations.