ChaptersEventsBlog
Get Free Early Access to TAISE Module 3! Sample the Certificate Experience Today!

All Articles

All Articles
Observations on CSA Summit at RSA – Part 1

Blog Published: 03/15/2017

By Katie Lewin, Federal Director, Cloud Security AllianceCSA Summit at RSA was a day-long session on Securing the Converged Cloud organized around presentations and panels from leading vendors such as Centrify, Veracode, Microsoft, and Netskope, as well as a talk on “Effective Cybersecurity” b...

Odds Are in Quantum Encryption’s Favor

Blog Published: 03/22/2017

By Jane Melia, Vice President of Strategic Business Development , QuintessenceLabs and Co-chair, CSA Quantum-safe Security Working Group[caption id="attachment_3386" align="alignleft" width="227"] Image credit: Jeff Kubina[/caption]No kinds of organizations have tighter security than the avera...

Brexit or Bust: What Does It Mean for Data?

Blog Published: 03/23/2017

By Nic Scott, Managing Director/UK, Code 42What’s the latest on Brexit? When the UK government triggers Article 50, it will signal the start of the official two-year countdown until the UK leaves the European Union. According to UK Prime Minister Theresa May, this is still on track to happen a...

CASB Is Eating the IDaaS Market

Blog Published: 03/31/2017

By Rich Campagna, Senior Vice President/Products & Marketing, BitglassIn the past 6-9 months, I've noticed a trend amongst Bitglass customers where more and more of them are opting to use the identity capabilities built into our Cloud Access Security Broker (CASB) in lieu of a dedicated I...

Why You Need a CASB for GDPR Compliance

Blog Published: 04/04/2017

By Rich Campagna, Senior Vice President/Products & Marketing, BitglassWith enforcement of the EU's General Data Protection Regulation (GDPR) is just over a year away in May, 2018, your planning efforts should already be well underway. Adoption of cloud applications across the EU continues ...

The Cure for Infectious Malware

Blog Published: 04/10/2017

By Chantelle Patel, Marketing Manager, BitglassOrganizations have seen rapid growth in cloud adoption over the last few years which in turn have introduced new threats and increased the risk of data leakage. Among the most prominent threats are malware and ransomware – long a problem on endpoi...

There May Be a Shark Circling Your Data

Blog Published: 04/17/2017

By Jacob Serpa, Product Marketing Manager, BitglassIn today's business environment, cybersecurity remains a topic of great importance. As more companies migrate to the cloud, security concerns continue to evolve. While BYOD (bring your own device) affords employees more flexibility as they wor...

Self-Driving Information Security

Blog Published: 04/21/2017

By Jim Reavis, Co-founder and CEO, Cloud Security AllianceThe prospects of autonomous self-driving vehicles becoming a pervasive presence on our roadways seems more likely everyday. From the big automakers to Tesla to Google to Uber, a wide range of companies are investing a tremendous amount ...

How to Choose a Sandbox

Blog Published: 04/24/2017

Grab a shovel and start digging through the detailsBy Mathias Wilder, Area Director and General Manager/EMEA Central, ZscalerBusinesses have become painfully aware that conventional approaches — virus signature scanning and URL filtering — are no longer sufficient in the fight against cyberthr...

Mind the Gap

Blog Published: 05/05/2017

By Matt Piercy, Vice President and General Manager EMEA, ZscalerThe sheer number of IT departments that are not acknowledging the numerous security gaps for cyber-attackers to exploit is astonishing. The problem is that many of those within the industry believe they have their security posture...

What You Need to Know About Changes to the STAR Program

Blog Published: 05/09/2017

By Debbie Zaller, CPA, CISSP, PCI QSA, Principal, Schellman & Co., LLCThe CSA recently announced that the STAR Program will now allow a one-time, first-year only, Type 1 STAR Attestation report. What is a Type 1 versus Type 2 examination and what are the benefits for starting with a Type 1...

Data Loss Threatens M&A Deals

Blog Published: 05/11/2017

By Jeremy Zoss, Managing Editor, Code42One of the most popular breakout sessions at Evolution17 featured a great merger and acquisition (M&A) scenario: Midway through the deal, critical information leaks, devastating the value of the deal. How can you figure out how much info leaked—by who...

Malware: Painting a Picture

Blog Published: 05/17/2017

By Jacob Serpa, Product Marketing Manager, BitglassPart OneNow more than ever, companies are flocking to the cloud. Through a variety of software as a service (SaaS) and infrastructure as a service (IaaS), enterprises are able to raise their efficiency, increase their flexibility, and decrease...

CTRL-Z and the Changing Data Landscape

Blog Published: 05/18/2017

By Mark Wojtasiak, Director of Product Marketing, Code42The massive “WannaCry” ransomware attack that appeared in Europe last week and spread to over 150 countries is a perfect illustration of why enterprise data storage is in a period of flux. Today, organizations can choose to keep their dat...

Ransomware 101

Blog Published: 05/19/2017

By Jacob Serpa, Product Marketing Manager, BitglassUnless you’ve been living under a rock for the last few weeks, you know that there has been a notable increase in cyberattacks around the world. Hackers have been spreading a type of ransomware called “WannaCry” via emails that trick recipient...

A Management System for the Cloud – Why Your Organization Should Consider ISO 27018

Blog Published: 05/22/2017

By Alex Hsiung, Senior Associate, Schellman & Co.Cloud computing technologies have revolutionized the way organizations manage and store their information. Where companies used to house and maintain their own data, a host of organizations have now made the switch to a cloud-based model du...

New CSA Report Offers Observations, Recommendations on Connected Vehicle Security

Blog Published: 05/25/2017

By John Yeoh, Research Director/Americas, Cloud Security AllianceConnected Vehicles are in the news for introducing new features and capabilities to the modern automobile. Headlines also highlight security hacks that compromise vehicle operations and usability. While sources note that the vuln...

Want To Empower Remote Workers? Focus On Their Data

Blog Published: 05/31/2017

By Jeremy Zoss, Managing Editor, Code42Here’s a nightmare scenario for IT professionals: Your CFO is working from the road on a high-profile, highly time sensitive business deal. Working late on documentation for the deal, a spilled glass of water threatens everything. His laptop is fried; all...

Office 365 Deployment: Research Suggests Companies Need to “Think Different”

Blog Published: 06/02/2017

Survey shows what companies expected and what they found outBy Atri Chatterjee, Chief Marketing Officer, ZscalerIt’s been six years since Microsoft introduced Office 365, the cloud version of the most widely used productivity software suite. In those years, Office 365 has earned its place as t...

My Second Attempt at Explaining Blockchain to My Wife

Blog Published: 06/07/2017

I tried explaining blockchain to my wife and here’s what happened...By Antony Ma, CTO/PowerData2Go, Founding Chairman/CSA Hong Kong and Macau Chapter, and Board Member/CSA Singapore ChapterI introduced my wife to Python around nine months ago, and now she’s tinkering and has drawn a tortoise o...

Looking for the CCM?

Start using the Cloud Controls Matrix to simplify compliance with multiple standards & regulations.