Cloud Security Alliance Opens Call for Presentations for EMEA Congress 2016
Blog Published: 05/24/2016
The Cloud Security Alliance has opened the call for papers for the 2016 CSA EMEA Congress, to be held November 15 at the Circulo de Bellas Artes in Madrid, Spain. CSA EMEA Congress is Europe’s premier cloud security event and is designed around the CSA’s core mission of promoting the use of be...
The Best Security KPIs Are the Ones That Matter to Your C-Suite
Blog Published: 05/25/2016
By Susan Richardson, Manager/Content Strategy, Code42What information security KPIs are you tracking? Are they tied specifically to your organization’s business goals? If not, consider that using predictive business performance metrics could help increase your organization’s profitability—by a...
Which Security Topics Are AWS Users Most Interested In?
Blog Published: 05/26/2016
By David Lucky, Director of Product Management, DatapipeWe hope this blog provides an insightful dive into topics like cloud computing, managed services, products, and ways to improve your business strategy. Of course, our partners have great things to say, as well. One of those partners is AW...
Five Telltale Signs You Don’t Have the Latest Backup System
Blog Published: 06/02/2016
By Susan Richardson, Manager/Content Strategy, Code42It’s Backup Awareness Month—time to take stock of how well your backup system is serving your organization. To help you get started, here are five telltale signs you don’t have the most modern endpoint backup system:1. You still get Help Des...
Filling the Cloud Security IT Skills Gap... and Preventing Attrition
Blog Published: 06/08/2016
By Brian Dye, Corporate Vice President & General Manager/Corporate Products, Intel Security GroupWith all the various cloud services being offered in multiple deployment options, coupled with the 500,000 new security threats discovered daily, the strain on IT staff has never been greater. ...
Leaky End Users Star in DBIR 2016
Blog Published: 06/10/2016
By Susan Richardson, Manager/Content Strategy, Code42Insider threat once again tops the list of enterprise cyber security threats in the 2016 Verizon Data Breach Investigations Report (DBIR). For the second straight year, Verizon research showed that the average enterprise is less likely to ha...
Securing the Hybrid Cloud: What Skills Do You Need?
Blog Published: 06/14/2016
By Brian Dye, Corporate Vice President & General Manager/Corporate Products, Intel Security GroupWith enterprises moving to hybrid cloud environments, IT architectures are increasingly spread among on-premises infrastructure and public and private cloud platforms. Hybrid models offer many ...
More Than One-Fourth of Malware Files “Shared”
Blog Published: 06/15/2016
By Krishna Narayanaswamy, Chief Scientist, NetskopeLast week, Netskope released its global Cloud Report as well as its Europe, Middle East and Africa version highlighting cloud activity from January through March of 2016. Each quarter we report on aggregated, anonymized findings such as top us...
Confident Endpoint Visibility Responds to Modern Data Protection Problems
Blog Published: 06/17/2016
By Joe Payne, President and CEO, Code42Consumer tech adoption has outpaced tech evolution in business for more than ten years. SaaS and cloud solutions, new apps and devices are at the disposal of empowered workers, making it very easy for employees to get what they need to work anywhere or—de...
Why You Need a Multi-Layer Approach to Public Cloud Security
Blog Published: 06/20/2016
By Scott Montgomery, Vice President & Chief Technical Strategist, Intel Security GroupWould you hand your house keys to a total stranger and then go away on vacation for two weeks? Probably not, but that’s precisely what some businesses do when they move applications and data to the public...
Verizon DBIR Says You Can’t Stop the Storm—But You Can See It Coming
Blog Published: 06/22/2016
By Susan Richardson, Manager/Content Strategy, Code42The 2016 Verizon Data Breach Investigations Report (DBIR) paints a grim picture of the unavoidable enterprise data breach. But accepting the inevitability of breaches doesn’t mean accepting defeat. It’s like severe weather: you can’t prevent...
Little Bits of Security – Micro-Segmentation in Clouds
Blog Published: 06/27/2016
By Darren Pulsipher, Enterprise Solution Architect, Intel Corp.Cloud environments have made some things much easier for development teams and IT organizations. Self-service portals have cut down the amount of “hands on” intervention to spin up new environments for new products. Provisioning of...
Microsoft Azure Closes IaaS Adoption Gap with Amazon AWS
Blog Published: 06/29/2016
Percentage of Enterprise Computing Workloads in the Public Cloud Expected to Reach 41.05% This YearBy Cameron Coles, Director of Product Marketing, Skyhigh NetworksIndustry analyst firm Gartner predicts that the infrastructure as a service (IaaS) market will grow 38.4% in 2016 to reach $22.4 b...
FedRAMP High Baseline Requirements Published
Blog Published: 07/01/2016
By Abel Sussman, Director, TAAS–Public Sector and Cyber Risk Advisory, CoalfireThe Federal Risk and Authorization Management Program (FedRAMP) Project Management Office officially released its High baseline for High impact-level systems. This baseline is at the High/High/High categorization le...
Shock Treatment: Combatting Infosec Negligence
Blog Published: 07/06/2016
By Peter Wood, Cyber Security Consultant, Code42Boring training videos, box-ticking to meet regulations, blacklisting software at the expense of productivity: large enterprise has been reliant on these methods of “cyber security control” for too long. They are outdated and don’t work. Cyber cr...
No More Excuses – Time to Get a Grip On Your Cloud Security
Blog Published: 07/07/2016
Rolf Haas, Enterprise Technology Specialist/Network Security and Content Division, Intel SecurityCloud use continues to grow rapidly in the enterprise and has unquestionably become a part of mainstream IT – so much so that many organizations now claim to have a “cloud-first” strategy.That's ba...
An In-House Security Approach for Cloud Services That Won’t Drive Your IT Department Insane
Blog Published: 07/11/2016
By Jane Melia, VP/Strategic Business Development, QuintessenceLabs “If your security sucks now, you’ll be pleasantly surprised by the lack of change when you move to cloud.” -- Chris Hoff, Former CTO of Security, Jupiter Networks The chances are, almost everyone in your organization loves the ...
What You Need to Know: Navigating EU Data Protection Changes – EU-US Privacy Shield and EU General Data Protection Regulation
Blog Published: 07/12/2016
By Marshall England, Industry Marketing Director, Technology & Cloud, CoalfireIf you’re an organization with trans-Atlantic presence that transmits and stores European citizen data (e.g. employee payroll & HR data, client & prospect data) in the U.S. you will want to pay attention....
How Do We Stack Up to Gartner’s Five Steps for Ransomware Protection?
Blog Published: 07/15/2016
By Mark Wojtasiak, Director of Product Marketing, Code42Gartner’s June 2016 article, “Use These Five Backup and Recovery Best Practices to Protect Against Ransomware,” outlines five steps for mitigating the threat and/or risk of being hit with ransomware. I will spare you the market stats and ...
An Enterprise View of Software Defined Perimeter
Blog Published: 07/15/2016
By Jim Reavis, Co-founder and CEO, Cloud Security Alliance As cloud computing and unmanaged endpoints continue to gain traction, it is a foregone conclusion that information security technical controls must become more virtual - that is to say, software-based. Rapidly disappearing are the day...