ChaptersEventsBlog
Get Free Early Access to TAISE Module 3! Sample the Certificate Experience Today!

All Articles

All Articles
Tentative Safe Harbour Agreement Reached—For Now

Blog Published: 02/12/2016

By Rachel Holdgrafer, Business Content Strategist, Code42The European Union and the United States have reached a preliminary agreement that would allow companies doing business on both sides of the Atlantic to resume transmitting individuals’ digital data.Struck down in October 2015 for failin...

Something’s Gotta Give, And It’s You

Blog Published: 02/17/2016

By David Payne, VP Systems Engineering, Code42IT has lost the ability to unilaterally command which software employees access and what devices they carry. Anybody with a credit card can get the tools he or she needs to work fast and unencumbered. This freedom has significant impact on data sec...

Top Ten Reasons You Need to Attend the CSA Summit @ RSA February 29th

Blog Published: 02/22/2016

Cloud Security Alliance’s 7th annual CSA Summit @ RSA will be our biggest yet, with educational sessions covering cloud security from every angle. This Monday event is free for any type of RSA Conference pass holder, so make your plans to attend. If you need any more enticement, below are th...

The Netskope Cloud Report: The Cloud Malware Fan-out

Blog Published: 02/23/2016

By Krishna Narayanaswamy, Co-founder and Chief Scientist, NetskopeToday we released our Cloud Report in which we highlight cloud security findings from October through December of 2015.This quarter we focus on an important finding from our research team. In scanning many hundreds of our custom...

Apple vs. FBI: The “Bad” Guys Always Get the “Good” Weapons

Blog Published: 02/24/2016

By Susan Richardson, Manager/Content Strategy, Code42It’s a powerful tool, created for good—until it falls into the wrong hands. Sounds like a classic James Bond plot, right? That’s how we see the battle surrounding government-mandated “backdoors” playing out—and why we side with Apple (and mo...

Quantum Technologies and Real World Information Security Challenges

Blog Published: 02/25/2016

By Bruno Huttner, Quantum Safe Product Manager, ID QuantiqueMost cyber security applications rely on a few cryptographic primitives, for both encryption and signature. These primitives are now known to be breakable by a Quantum Computer (QC), that is a computer operating according to the rules...

Cloud Data Security Services Just Got Easier to Build and Assess

Blog Published: 02/26/2016

By Alan Eng, Senior Manager/Product Marketing, VormetricIt is well documented that security is the leading concern hindering cloud adoption. However, it is not so clear cut how to build secure cloud services, or how to assess whether cloud services adhere to relevant security requirements. The...

CSA’s Consensus Assessments Initiative Releases Minor Update to Version 3.0.1

Blog Published: 02/29/2016

CSA’s Consensus Assessments Initiative Working Group has released an update to version 3.0.1 of the Consensus Assessments Initiative Questionnaire (CAIQ) that included minor updates and corrections.A tab was created in the spreadsheet titled “CAIQ Change Log” to capture the details of each upd...

CSA’S Virtualization Working Group Publishes New Position Paper on Network Function Virtualization

Blog Published: 02/29/2016

With the broad adoption of virtualized infrastructure, many security teams are now struggling with how to best secure these vital assets from targeted attacks. And because almost anyone can now easily virtualize resources such as compute, storage, networking and applications, the velocity and ...

SecaaS Working Group Releases Preview of Security as a Service Functional Domain Definitions – Including Continuous Monitoring

Blog Published: 02/29/2016

By John Yeoh, Senior Research Analyst, Global, Cloud Security AllianceNumerous security vendors are now leveraging cloud-based Security as a Service (SecaaS) models to deliver security solutions. This shift has occurred for a variety of reasons including greater economies of scale and streamli...

The Software-Defined Perimeter and IaaS: A New Initiative

Blog Published: 03/02/2016

By Kurt Glazemakers, CTO, CryptzoneAs enterprises embrace infrastructure as a service (IaaS) platforms, shifting new development and production into these environments, they face some challenges due to the dynamic nature of IaaS. Security, compliance and business & IT efficiency – specific...

Security Versus Privacy in Today’s Enterprise

Blog Published: 03/03/2016

By Rachel Holdgrafer, Business Content Strategist, Code42Whether enterprise security or personal data privacy should prevail in the enterprise is the debate of the century. With internal actors responsible for 43 percent of enterprise data loss and 62 percent of respondents to the2016 Cyber De...

15 Data Security Policies Ignored by Modern Workers

Blog Published: 03/09/2016

By Rachel Holdgrafer, Business Content Strategist, Code42IT isn’t the only department stretched thin. In the past 20 years the economy has grown nearly 60 percent. Corporate profits have increased 20 percent. And wages have stagnated for most Americans. The workday goes from 9 to 7 and the U.S...

Between SSL-cylla and Charib-TLS

Blog Published: 03/11/2016

By Jacob Ansari, Manager, Schellman & Company, Inc.Securing encrypted Internet traffic transmissions, such as those between web browsers and web servers, is decidedly not simple. Despite the fact that well-established protocols, namely Secure Sockets Layer (SSL) and Transport Layer Securit...

CSA Summit San Francisco 2016 Recap

Blog Published: 03/11/2016

By Frank Guanco, Research Project Manager, CSA Global At the end of February, the Cloud Security Alliance (CSA) concluded its CSA Summit San Francisco 2016 with a full slate of presentations, releases, and announcements. CSA Summit kicked off the week with a full day of speakers and panels ...

EU Safe Harbor and Privacy Shield: Timelines, Deadlines and Red Lines

Blog Published: 03/16/2016

What has happened since safe harbor was declared invalid and what’s next? By Nigel Hawthorne, EMEA Marketing Director, Skyhigh Networks As a quick reminder, Safe Harbor was the primary legal mechanism that allowed US-based companies and cloud providers to transfer data on European ...

CIO, CISO and IT Practitioners Worry They Will Face a Datastrophe!

Blog Published: 03/18/2016

By Rick Orloff, Chief Security Officer, Code42We are not lacking choices: whether it’s in the information we consume, the things we can buy or the ability to express ourselves through multimedia channels. It’s therefore no surprise that our most valuable asset, human capital, is finding ways t...

Top 3 Malware Bogeymen Keeping CISOs Up at Night

Blog Published: 03/22/2016

By Susan Richardson, Manager/Content Strategy, Code42What keeps CISOs up at night? Of all the cyberthreats, malware sends chills down a CISO’s spine, according to The CyberEdge Group’s recently released 2016 Cyberthreat Defense Report. Malware bogeymen come in many shapes and sizes. Here are t...

Kicking Tires on World Backup Day: A Five-Point Inspection for Endpoint Backup

Blog Published: 03/29/2016

By Rachel Holdgrafer, Business Content Strategist, Code42Living with the constant threat of data breach or loss, large organizations have comprehensive remediation plans designed to guarantee speedy data recovery and business continuity. March 31, 2016 is World Backup Day—the perfect time to e...

Four Security Solutions Not Stopping Third-Party Data Breaches

Blog Published: 03/31/2016

By Philip Marshall, Director of Product Marketing, CryptzoneA new breed of cyberattack is on the rise. Although it was practically unheard of a few years ago, the third-party data breach is rapidly becoming one of the most infamous IT security trends of modern times: Target, Home Depot, Goodwi...

Looking for the CCM?

Start using the Cloud Controls Matrix to simplify compliance with multiple standards & regulations.