ChaptersEventsBlog
Get Free Early Access to TAISE Module 3! Sample the Certificate Experience Today!

All Articles

All Articles
Don’t Let Your Cloud Security Strategy Get Railroaded by Old Thinking

Blog Published: 04/04/2016

By Player Pate, Senior Manager/Product Marketing, Cisco Security Business GroupThe standard gauge used for railroads (that is the distance between the rails) in the U.S. is four feet, eight and a half inches, which is an odd number however you look at it. The history behind it is even stranger...

How to Get C-suite Support for Insider Threat Prevention

Blog Published: 04/06/2016

By Susan Richardson, Manager/Content Strategy, Code42If you’re not getting support and adequate funding from the C-suite to address insider threats, a recent report highlights a powerful persuasive tool you may have overlooked: money—as in fines (cha-ching), lawsuits (cha-ching) and credit mon...

How CASB Is Different from Web Proxy / Firewall

Blog Published: 04/08/2016

By Cameron Coles, Sr. Product Marketing Manager, Skyhigh Networks A common question that arises as IT teams begin to look at cloud access security broker (CASB) products goes something like, “we already have a web proxy and/or firewall, how is this different?” or “does CASB replace my web prox...

CSA Releases New White Paper on Current Cloud Certification Challenges Ahead and Proposed Solutions

Blog Published: 04/11/2016

By Daniele Catteddu, Chief Technology Officer, Cloud Security AllianceToday, the Cloud Security Alliance has released the CSA STAR Program & Open Certification Framework in 2016 and Beyond, an important new whitepaper that has been created to provide the security community with a descripti...

Panama Papers Expose Data Security Deficiencies in Law Firms

Blog Published: 04/12/2016

By Rick Orloff, Chief Security Officer, Code42The unprecedented leak of 11.5 million files from the database of the world’s fourth biggest offshore law firm is riveting. As details continue to emerge about the Panama Papers leak, the money laundering and secretive tax regimes and high-profile ...

BYOD Stalled? Three Tips to Get It Going

Blog Published: 04/19/2016

By Susan Richardson, Manager/Content Strategy, Code42Despite some surveys that say Bring Your own Device (BYOD) is growing, the CyberEdge Group’s recently released 2016 Cyberthreat Defense Report found that enterprise BYOD programs have stalled. Only one-third of respondents this year had impl...

WP29: Thumbs Down to Draft EU-US Privacy Shield

Blog Published: 04/20/2016

By Françoise Gilbert,Global Privacy and Cybersecurity Attorney, Greenberg TraurigIn a 58-page opinion published April 13, 2016, the influential European Union Article 29 Working Party (WP29), which includes representatives of the data protection authorities of the 28 EU Member States, express...

May the Fourth Be with EU

Blog Published: 04/20/2016

Data Privacy Gets a Stronger Light SaberBy Nigel Hawthorn, EMEA Marketing Director, Skyhigh NetworksOn April 14, 2016, the EU Parliament passed the long-awaited new EU rules for personal data protection (GDPR). Everyone who holds or processes data on individuals in the 28 countries of the EU h...

The Panama Papers, Mossack Fonseca and Security Fundamentals

Blog Published: 04/21/2016

By Matt Wilgus, Practice Director, SchellmanThe release of details contained in the Panama Papers will be one of the biggest news stories of the year. The number of high-profile individuals implicated will continue to grow as teams comb through the 11.5 million documents leaked from Mossack Fo...

Can a CASB Protect You From the Treacherous 12?

Blog Published: 04/25/2016

By Ganesh Kirti, Founder and CTO, PalerraMany frequently asked questions related to cloud security have included concerns about compliance and insider threats. But lately, a primary question is whether cloud services are falling victim to the same level of external attack as the data center. W...

Survey of IT Pros Highlights Lack of Understanding of SaaS Data Loss Risks

Blog Published: 04/26/2016

By Melanie Sommer, Director of Marketing, Spanning by EMCRecently, Spanning – an EMC company and provider of backup and recovery for SaaS applications – announced the results of a survey* of over 1,000 IT professionals across the U.S. and the U.K. about trends in SaaS data protection. It turns...

10 Key Questions to Answer Before Upgrading Enterprise Software

Blog Published: 04/27/2016

By Rachel Holdgrafer, Business Content Strategist, Code42The evolution of software has made possible things we never dreamed. With software upgrades come new competencies and capabilities, better security, speed, power and often disruption. Whenever something new enters an existing ecosystem, ...

Five Endpoint Backup Features That Help Drive Adoption

Blog Published: 05/03/2016

By Susan Richardson, Manager/Content Strategy, Code42If you’re among the 28 percent of enterprises that still haven’t implemented a planned endpoint backup system, here are 5 key attributes to look for in a system, to help drive adoption and success. These recommendations are courtesy of Laura...

DoD Updates Government Security Requirements for Cloud, But What Does That Really Mean?

Blog Published: 05/06/2016

By Brian Burns, Bid Response Manager/Government Affairs, DatapipeIT officials from the Department of Defense (DoD) have released an update to the Cloud Computing Security Requirements Guide (CC SRG), which establishes security requirements and other criteria for commercial and non-Defense Depa...

How to Reduce Costs and Security Threats Using Two Amazon Tools

Blog Published: 05/10/2016

By David Lucky, Director of Product Management, DatapipeHave you ever gone to see a movie that would have been amazing if not for one person? The plot was engaging, the dialogue was well-written, and there were strong performances from most of the cast. But there was just that one actor who si...

Outdated Privacy Act Close to Getting an Upgrade

Blog Published: 05/12/2016

By Susan Richardson, Manager/Content Strategy, Code42The outdated Electronic Communications Privacy Act (ECPA) may finally get a much-needed upgrade, but the reform can’t come soon enough for Microsoft, other cloud providers and privacy advocates. Here’s what you need to know:The issues:The EC...

Providing Trust and Assurance Through Cloud Certification and Attestation: A Complimentary CSA STAR Program Webinar by Schellman

Blog Published: 05/12/2016

By Avani Desai, Executive Vice President, SchellmanIn the last 24 months, the Cloud Security Alliance (CSA) has made great strides in enhancing their CSA Security, Trust and Assurance Registry (STAR) Program. In brief, the STAR Program is a publicly available registry designed to recognize as...

Cloud Computing: A Little Less Cloudy

Blog Published: 05/16/2016

By Christina McGhee, Manager/FedRAMP Technical Lead, SchellmanToday, consumers have an increasing interest in implementing cloud solutions to process and store their data. They are looking to take advantage of the benefits provided by cloud computing, including flexibility, cost savings, and a...

Addressing Cloud Security Concerns in the Enterprise

Blog Published: 05/18/2016

By David Lucky, Director of Product Management, DatapipeBusinesses want to move to the cloud, they really do. And more than ever, they’re starting to make the switch: A Cloud Security Alliance (CSA) study that polled more than 200 IT professionals found that 71.2 percent of companies now have ...

Bridging the Divide Between CISOs and IT Decision Makers

Blog Published: 05/20/2016

By Rick Orloff, Chief Security Officer, Code42In a large organization, leaders create a vision and strategy for the business and employees work to achieve the vision. At the business unit level in information technology, CIOs, CSOs and CISOs define their strategies while other IT decision make...

Looking for the CCM?

Start using the Cloud Controls Matrix to simplify compliance with multiple standards & regulations.