EU-US Safe Harbor: Model Clauses – Not All They’re Cracked Up to Be…
Blog Published: 10/21/2015
By Willy Leichter, Global Director, Cloud Security, CipherCloudIn a recent blog post, we referred to the now defunct EU-US Safe Harbor framework as a house of straw, while comparing the European Commission (EC) Model Clauses (the theoretical replacement) to a house of sticks – better, perhaps,...
California Leads the Way with Data Privacy Ruling
Blog Published: 10/22/2015
By Rachel Holdgrafer, Business Content Editor, Code42Should electronic communications and metadata be afforded the same legal protections as printed correspondence? The State of California thinks so.Introduced in February 2015 and signed into law on October 8, 2015, the California Electronic C...
Three Ways to Improve Your Personal Cyber Safety
Blog Published: 10/23/2015
By Gavin Reid, Vice President/Threat Intelligence, LancopeFor National Cyber Security Awareness month there a couple of relatively easy-to-do things that I highly recommend if you want to improve your personal cyber safety. These important protections are easily available but not well document...
The Definition of Cloud Computing
Blog Published: 10/26/2015
By Ross Spelman, Group Technical Services Manager, EspionWhat is the cloud and why should I go there?The transition to cloud services offers major opportunities for your organisation. Significant scalability, flexibility and cost-efficiency can all be achieved through the adoption of cloud-bas...
Spread the Message Beyond the Experts
Blog Published: 10/28/2015
By Andrew Wild, Chief Information Security Officer, LancopeOctober is National Cyber Security Awareness Month. But if you’re reading this blog, chances are good that you are an experienced information security professional and that you’re focused on awareness every month! So, how do you explai...
The Blind Spot of Insider Threat
Blog Published: 10/29/2015
By Paul Calatayud, Guest Blogger, Code42Security threats from inside the organization are increasing, but too many organizations hesitate to address the issue. They’re afraid that monitoring employee behavior implies they don’t trust employees. Today, the reality is that employees are often un...
Five Tips for Not Becoming an Insider Threat
Blog Published: 10/30/2015
By Andrew Wild, Chief Information Security Officer, LancopeMost employees are honest, trustworthy people that would not steal from their employer or intentionally take sensitive, private information from their job and sell it. But many well-meaning employees are taken advantage of by attackers...
Eleven Essential Findings from Skyhigh’s Q4 2015 Cloud Report
Blog Published: 11/04/2015
Our Latest Research Reveals Opportunities and Threats As Business-Critical Data Moves to the CloudBy Cameron Coles, Sr. Product Marketing Manager, Skyhigh Networks Cloud services are now an integral part of corporate life. Companies use, on average, 1,154 cloud services ranging from enterpri...
Enterprise Data Breaches on the Rise Despite Infosec Policies
Blog Published: 11/06/2015
By Rachel Holdgrafer, Business Content Strategist, Code42The results of the 2014 Protiviti IT Security and Privacy Survey reports that:• 77% of organizations have a password policy or standard.• 67% of organizations have a data production and privacy policy.• 67% of organizations have an in...
CISA Threatens Privacy, Moves on Anyway
Blog Published: 11/12/2015
By Rachel Holdgrafer, Business Content Strategist, Code42The Cyber Information Sharing Act (CISA) passed in a 74-21 U.S. Senate vote last week. Critics of CISA say the bill will allow the government to collect sensitive personal data unchecked. Civil liberty, privacy groups, leading technology...
Cyber Security Lessons from “The Martian”
Blog Published: 11/16/2015
By TK Keanini, Chief Technology Officer, LancopeFirst things first, if you have not seen the movie or read the book “The Martian,” stop right now and do not continue because there will be spoilers. You have been warned.On more than one occasion in my life as a security professional, I have fel...
The Numbers Behind Cloud User Error
Blog Published: 11/19/2015
By Sam Bleiberg, Corporate Communications Manager, Skyhigh NetworksIn the not-too-distant past, service providers had a tough time convincing enterprise IT departments that cloud platforms were secure enough for corporate data. Fortunately perspectives on cloud have matured, and more and more ...
Never Pay the Ransomer
Blog Published: 11/20/2015
By Rachel Holdgrafer, Business Content Strategist, Code42CryptoWall has struck again—only this time it’s nastier than before. With a redesigned ransom note and new encryption capabilities, BleepingComputer.com’s description of the “new and improved” CryptoWall 4.0 sounds more like a marketing ...
Six Reasons Why Encryption Back Doors Won’t Deter Terrorists
Blog Published: 11/20/2015
By Willy Leichter, Global Director of Cloud Security, CipherCloudLast week’s tragic events in Paris, and fears over similar terrorist attacks around the world, have revived a long-standing debate. Early evidence suggests that the terrorists used a readily available encryption app to hide their...
More Cyber Security Lessons From “The Martian”
Blog Published: 11/23/2015
By TK Keanini, Chief Technology Officer, LancopeIn last week’s post, I covered the methodologies Mark Watney used to stay alive on the surface of Mars and how those lessons can be adapted for better cyber security back on Earth. As usual, this post will contain spoilers for The Martian, so clo...
Good and Bad News on Safe Harbour: Take a Life Ring or Hold Out for a New Agreement?
Blog Published: 12/01/2015
By Susan Richardson, Manager/Content Strategy, Code42If your organization relied on the now-invalid Safe Harbour agreement to legally transfer data between the U.S. and the EU, there’s good news and bad news.The good news? The European Commission just threw you some life rings. The governing b...
Network Segmentation and Its Unintended Complexity
Blog Published: 12/03/2015
By Kevin Beaver, Guest Blogger, LancopeLook at the big security regulations, i.e. PCI DSS, and any of the long-standing security principles and you’ll see that network segmentation plays a critical role in how we manage information risks today. The premise is simple: you determine where your s...
The EU GDPR and Cloud: Six Must-Dos to Comply
Blog Published: 12/04/2015
By Krishna Narayanaswamy, Co-founder and Chief Scientist, NetskopeYou don’t have to be European to care about the European Commission’s pending EU General Data Protection Regulation (GDPR). Set to be adopted in 2017 and implemented the following year, carrying penalties up to 5 percent of an e...
Gartner’s Latest CASB Report: How to Evaluate Vendors
Blog Published: 12/07/2015
Market Guide Compares CASB Vendors And Provides Evaluation CriteriaBy Cameron Coles, Senior Product Marketing Manager, Skyhigh NetworksAs sensitive data moves to the cloud, enterprises need new ways to meet their security, compliance, and governance requirements. According to Gartner Research,...
An Overview of the Security Space and What’s Needed Today
Blog Published: 12/09/2015
By Kevin Beaver, Guest Blogger, LancopeFairly often, I have friends and colleagues outside of IT and security ask me how work is going. They’re curious about the information security industry and ask questions like: How much work are you getting? Why are we seeing so many breaches? Are things ...