ChaptersEventsBlog
Register for DataSecAI 2025 in Dallas – Protect Data, Secure AI, and Drive Innovation

All Articles

All Articles
Are endpoints the axis of evil or the catalyst of creation?

Blog Published: 08/11/2015

By Dave Payne, Vice President of Systems Engineering, Code42 If security pros had their way, they’d make laptops so secure they’d be virtually unusable. Protecting against every imaginable attack–not to mention the fallibility of the human connected to the laptop–is a battle we keep losing...

What is Quantum Key Distribution?

Blog Published: 08/11/2015

By Frank Guanco, Research Project Manager, CSAFollowing this year’s RSA Conference, the Cloud Security Alliance formed a new working group called the Quantum-Safe Security Working Group (QSSWG). The QSSWG working group recently published a follow-up paper entitled “What is Quantum-Safe Computi...

Trusting the Cloud: A Deeper Look at Cloud Computing Market Maturity

Blog Published: 08/12/2015

By Frank Guanco, Research Project Manager, CSADue to its exponential growth in recent years, cloud computing is no longer considered an emerging technology. Cloud computing, however, cannot yet be considered a mature and stable technology. Cloud computing comes with both the benefits and the d...

How to create the perfect climate for endpoint data migration

Blog Published: 08/18/2015

By Andy Hardy, EMEA Managing Director, Code42Today’s enterprise organizations face an escalating problem. As the use of laptops, tablets and smartphones continues to grow, the amount of data created and stored on these endpoint devices is increasing at pace.In fact, typically half of an organi...

MITRE Matrix: Going on the ATT&CK

Blog Published: 08/19/2015

By TK Keanini, Chief Technology Officer, LancopeMost cybersecurity work is geared towards finding ways to prevent intrusions – passwords, two-factor authentication, firewalls, to name a few – and to identify the “chinks in the armor” that need to be sealed. The characteristics of malware are s...

The Cloud and Cybersecurity

Blog Published: 08/20/2015

By Vibhav Agarwal, Senior Manager of Product Marketing, MetricStreamTomorrow’s digital enterprise is at war today. War not only with external cybersecurity hackers and viruses, but also within the organization itself – a conclusion based on my discussions with information security managers and...

M&A Concern: Is your data walking out the door with employees?

Blog Published: 08/25/2015

By Susan Richardson, Manager/Content Strategy, Code42 If you’re at one of the 40,000+ companies a year worldwide that announce a merger or acquisition, your biggest worry may not be combining IT systems. It may be all those employees walking out the door with your data.Layoffs and voluntar...

Info security: an eggshell defense or a layer cake strategy

Blog Published: 09/02/2015

By Susan Richardson, Manager/Content Strategy, Code42Eggshell security describes a practice in which organizations depend on a traditional model of a “hardened outer layer of defenses and a network that is essentially wide open, once the attacker has made it past perimeter defenses.”In an arti...

Four criteria for legal hold of electronically stored information (ESI)

Blog Published: 09/09/2015

By Chris Wheaton, Privacy and Compliance Counsel, Code42The average enterprise sees its data double every 14 months — nearly one-third of which is stored on endpoints, such as laptops and mobile devices. This rapid growth in electronically stored information (ESI) creates new challenges and dr...

AV Can’t Stop Zero-Day Attacks and They’re Hurting Productivity

Blog Published: 09/22/2015

By Susan Richardson, Manager/Content Strategy, Code42It’s been almost 18 months since Symantec officially declared antivirus software “dead” in an interview with the Wall Street Journal. So why did a recent study by ESG find that 73 percent of enterprises have at least two AV products deployed...

What’s a CASB? Gartner Report Outlines Use Cases, Architecture, and Evaluation Criteria

Blog Published: 09/29/2015

By Cameron Coles, Sr. Product Marketing Manager, Skyhigh NetworksGiven the explosive growth of cloud computing and numerous high-profile security and compliance incidents, it’s not surprising that surveys of IT leaders find that cloud tops the list of security priorities this year. In its late...

Cloud Security Alliance CEO’s Top Cloud Security Priorities

Blog Published: 10/02/2015

By Jim Reavis, CEO, Cloud Security Alliance.I would like to thank my friends at Code42 for again giving me a platform to talk about the cloud security issues on my mind. In this blog post, I wanted to discuss some of the changes I am seeing in how security professionals are rethinking best pra...

Fall 2015 Netskope Cloud Report: Healthcare and Life Sciences Have the Most Violations

Blog Published: 10/06/2015

By Krishna Narayanaswamy, Co-founder and Chief Scientist, NetskopeToday we released our Cloud Report for Fall 2015 – global as well as and Europe, Middle East and Africa versions. Each quarter we report on aggregated, anonymized findings such as top used apps, top activities, and top policy vi...

The Web’s Greediest Villain: Ransomware

Blog Published: 10/07/2015

By Aimee Simpson, Integrated Marketing Manager, Code42President Obama designated October as National Cyber Security Awareness Month (NCSAM). This U.S. observance is meant to engage, educate and raise awareness of the importance of cybersecurity to our nation. This month, Code42 is celebrating...

CSA Congress at PSR 2015 Recap Roundup

Blog Published: 10/07/2015

By Frank Guanco, Research Project Manager, CSA GlobalLast week, the CSA Congress and IAPP Privacy Academy teamed up in Las Vegas, Nevada for the Privacy.Security.Risk. (PSR) conference. This was the second privacy and security conference that the Cloud Security Alliance (CSA) and the Internati...

Three Killer Use Cases for Skyhigh’s New Patented Pervasive Cloud Control

Blog Published: 10/09/2015

By Kamal Shah, SVP, Products and Marketing, Skyhigh NetworksIf cloud services were used only by employees who worked from the office, on company-issued devices, enforcing cloud policies would be straight-forward. IT Security would simply direct all traffic, for all employees, across all cloud ...

Conversation with an HP Instructor: “Cyber Security is part of the job for business people today”

Blog Published: 10/09/2015

By Kelly P. Baig, Education Services Instructor, HPAre you aware of the latest trends in cyber-security attacks and the tactics used by bad actors to exploit your security weak points? More importantly, have you put in place appropriate protection against these threats? One starting point as c...

CSA Release Cloud Forensics Capability Maturity Model Report

Blog Published: 10/12/2015

CSA’s Incident Management and Forensics Working Group today released its “Cloud Forensics Capability Maturity Model”, a new research report that describes a Capability Maturity Model (CMM) that can be used by both cloud consumers and Cloud Service Providers (CSPs) in assessing their process ma...

Managing Shadow IT

Blog Published: 10/14/2015

By Rachel Holdgrafer, Business Content Editor, Code42“Shadow IT,” or solutions not specified or deployed by the IT department, now account for 35 percent of enterprise applications. Research shows an increase in IT shadow spend with numbers projected to grow another 20 percent by the end of 20...

CASBs: A Better Approach to Cloud Encryption

Blog Published: 10/20/2015

By Anurag Kahol, Founder and CTO, Bitglass Widespread enterprise adoption of public cloud applications like Office 365 has not come without security and compliance concerns. Most cloud apps function like a black box, providing little visibility or control over the handling of sensitive data. W...

Looking for the CCM?

Start using the Cloud Controls Matrix to simplify compliance with multiple standards & regulations.