ChaptersEventsBlog
Get Free Early Access to TAISE Module 3! Sample the Certificate Experience Today!

All Articles

All Articles
Cyber Insurance Against Phishing? There’s a Catch

Blog Published: 12/15/2016

By Jeremy Zoss, Managing Editor, Code42If one of your employees gets duped into transferring money or securities in a phishing scam, don’t expect your cyber insurance policy to cover it. And even your crime policy won’t cover it unless you purchase a specific social engineering endorsement. Ma...

Adding Up the Full Cost of a Data Breach

Blog Published: 12/19/2016

By Nigel Hawthorn, Skyhigh Networks, EMEA Marketing DirectorData breaches are happening all the time; often they hit the news for a short while then they are replaced with the latest list of victims, so we thought we’d review a data breach from a year ago and look back at the total cost to the...

Three Lessons From the San Francisco Muni Ransomware Attack

Blog Published: 12/22/2016

By Laurie Kumerow, Consultant, Code42On Black Friday, a hacker hit San Francisco’s light rail agency with a ransomware attack. Fortunately, this story has a happy ending: the attack ended in failure. So why did it raise the hairs on the back of our collective neck? Because we fear that next ti...

Six Cloud Threat Protection Best Practices from the Trenches

Blog Published: 01/06/2017

By Ajmal Kohgadai, Product Marketing Manager, Skyhigh NetworksAs enterprises continue to migrate their on-premises IT infrastructure to the cloud, they often find that their existing threat protection solutions aren’t sufficient to consistently detect threats that arise in the cloud. While sec...

Long Con or Domino Effect: Beware the Secondary Attack

Blog Published: 01/12/2017

By Jeremy Zoss, Managing Editor, Code42Lightning may not strike twice, but cybercrime certainly does. The latest example: A year after the major hack of the U.S. Office of Personnel Management (OPM), cyber criminals are again targeting individuals impacted by the OPM breach with ransomware at...

Windows 10 Steps Up Ransomware Defense

Blog Published: 01/17/2017

By Jeremy Zoss, Managing Editor, Code42Here’s some good news for the countless businesses getting ready for the migration to Windows 10: Microsoft recently announced that its Windows 10 Anniversary Update features security updates specifically targeted to fight ransomware. No defense is comple...

People Are Not IP Addresses…So Why Do Security Solutions Think They Are?

Blog Published: 01/18/2017

By Jason Garbis, Vice President of Products, Cryptzone Attackers are erasing database contents and replacing them with a note demanding Bitcoin ransom payment for restoration. It also appears that victims who pay are often not getting their data back, and that multiple attackers are overwritin...

STAR- A Window to the Cloud

Blog Published: 01/20/2017

By Raj Samani, Chief Technology Officer/EMEA, Intel SecurityWe are all going to live in the cloud. Well that is what every study, and forecast tells us. From our clash of clans villages, to our connected cars we can expect all of our data to be hosted in an unmarked data center in a town that ...

CSA releases Quantum-Safe Security Glossary

Blog Published: 01/25/2017

The Cloud Security Alliance's Quantum-Safe Security (QSS) Working Group announces their latest release with the Quantum-Safe Security Glossary. The QSS Working Group was formed to address key generation and transmission methods and to help the industry understand quantum-safe methods for prote...

On Data Privacy Day, Keep Your Data Safe by Identifying the Threats

Blog Published: 01/30/2017

By Rick Orloff, Chief Security Officer, Code42Saturday, January 28th was Data Privacy Day. We’re proud champions of the National Cyber Security Alliance’s focused effort on protecting privacy and safeguarding data. But at Code42, we know that one day isn’t enough. We dedicate an entire month e...

3-2-1, Takeoff. The STARWatch Cloud Security Management Application Has Launched

Blog Published: 02/13/2017

By Daniele Catteddu, Chief Technology Officer, Cloud Security AllianceCompliance, assurance and vendor management are becoming more and more complex and resource-intensive issues, so we created STARWatch, a Software as a Service (SaaS) application designed to provide organizations a centralize...

New Security Research – the Software-Defined Perimeter for the Cloud

Blog Published: 02/13/2017

By Jason Garbis, Vice President of Products, CryptzoneOn behalf of the Cloud Security Alliance, I’m pleased to announce the publication of our newest security research from the Software Defined Perimeter (SDP) Working Group, exploring how the SDP can be applied to Infrastructure-as-a-Service e...

The New CSA Consultancy Program Will Ensure Best Practices in Secure Cloud Implementation

Blog Published: 02/13/2017

By Daniele Catteddu, Chief Technology Officer, CSAAs increasing numbers of enterprises begin the move to the cloud in earnest, there has simultaneously developed a host of third-party consultancy firms, offering guidance on cloud technology best practices and implementation. Recognizing that t...

Avoid the Heartbreak of Insider Threat

Blog Published: 02/14/2017

By Ashley Jarosch, Manager/Marketing Programs, Code42While everyone else is celebrating love and romance this Valentine’s Day, here at Code42 we’re reflecting on heartbreak—specifically, the heartbreak of insider threat.The Heartbreak and Betrayal of Insider ThreatIt’s a feeling anyone in the ...

The Growth of Macs in the Enterprise Is Challenging the PC’s Dominance

Blog Published: 02/22/2017

By Jeremy Zoss, Managing Editor, Code42The PC has long been the default choice for business computers, but perhaps not for much longer. The growth of Macs in the enterprise has been exponential in recent years, as illustrated by the infographic below.For context on why Macs are growing in popu...

The Rise in SSL-based Threats

Blog Published: 02/23/2017

By Derek Gooley, Security Researcher, ZscalerOverviewThe majority of Internet traffic is now encrypted. With the advent of free SSL providers like Let’s Encrypt, the move to encryption has become easy and free. On any given day in the Zscaler cloud, more than half of the traffic that inspected...

Is Your Industry at High Risk of Insider Threat?

Blog Published: 02/24/2017

By Jeremy Zoss, Managing Editor, Code42In the movies, data theft is usually the work of outsiders. You’ve witnessed the scene a million times: A cyber thief breaks into a business, avoiding security measures, dodging guards and employees, and making off with a USB stick of valuable data second...

Prepare for Windows 10 Migration the Gartner Way

Blog Published: 03/08/2017

By Jeremy Zoss, Managing Editor, Code42It’s 2017, which means there’s a good chance your company is preparing to migrate to Windows 10. The operating system may have launched back in 2015, but this is the year that Gartner predicts enterprise adoption of the operating system will truly take of...

Market & Technology Readiness (MTRLs)

Blog Published: 03/09/2017

By Frank Khan Sullivan, Vice President/Marketing, Strategic BlueThere is a need to communicate a project’s maturity to a non-technical audience. The Market & Technology Readiness Level Framework [PDF] aims to provide decision makers with a holistic view of a project’s maturity in a simple ...

Preparing for the Quantum Future: Setting Global Security Standards to Make Us Quantum-Safe

Blog Published: 03/13/2017

By Frank Guanco, Quantum-Safe Security Working Group, Cloud Security AllianceRecently there has been an increase in the perceived threat of the quantum computer to modern cryptographic standards in widespread use. During the last year, security agencies such as the United States Government Nat...

Looking for the CCM?

Start using the Cloud Controls Matrix to simplify compliance with multiple standards & regulations.