Observations on CSA Summit at RSA – Part 1
Blog Published: 03/15/2017
By Katie Lewin, Federal Director, Cloud Security AllianceCSA Summit at RSA was a day-long session on Securing the Converged Cloud organized around presentations and panels from leading vendors such as Centrify, Veracode, Microsoft, and Netskope, as well as a talk on “Effective Cybersecurity” b...
Odds Are in Quantum Encryption’s Favor
Blog Published: 03/22/2017
By Jane Melia, Vice President of Strategic Business Development , QuintessenceLabs and Co-chair, CSA Quantum-safe Security Working Group[caption id="attachment_3386" align="alignleft" width="227"] Image credit: Jeff Kubina[/caption]No kinds of organizations have tighter security than the avera...
Brexit or Bust: What Does It Mean for Data?
Blog Published: 03/23/2017
By Nic Scott, Managing Director/UK, Code 42What’s the latest on Brexit? When the UK government triggers Article 50, it will signal the start of the official two-year countdown until the UK leaves the European Union. According to UK Prime Minister Theresa May, this is still on track to happen a...
CASB Is Eating the IDaaS Market
Blog Published: 03/31/2017
By Rich Campagna, Senior Vice President/Products & Marketing, BitglassIn the past 6-9 months, I've noticed a trend amongst Bitglass customers where more and more of them are opting to use the identity capabilities built into our Cloud Access Security Broker (CASB) in lieu of a dedicated I...
Why You Need a CASB for GDPR Compliance
Blog Published: 04/04/2017
By Rich Campagna, Senior Vice President/Products & Marketing, BitglassWith enforcement of the EU's General Data Protection Regulation (GDPR) is just over a year away in May, 2018, your planning efforts should already be well underway. Adoption of cloud applications across the EU continues ...
The Cure for Infectious Malware
Blog Published: 04/10/2017
By Chantelle Patel, Marketing Manager, BitglassOrganizations have seen rapid growth in cloud adoption over the last few years which in turn have introduced new threats and increased the risk of data leakage. Among the most prominent threats are malware and ransomware – long a problem on endpoi...
There May Be a Shark Circling Your Data
Blog Published: 04/17/2017
By Jacob Serpa, Product Marketing Manager, BitglassIn today's business environment, cybersecurity remains a topic of great importance. As more companies migrate to the cloud, security concerns continue to evolve. While BYOD (bring your own device) affords employees more flexibility as they wor...
Self-Driving Information Security
Blog Published: 04/21/2017
By Jim Reavis, Co-founder and CEO, Cloud Security AllianceThe prospects of autonomous self-driving vehicles becoming a pervasive presence on our roadways seems more likely everyday. From the big automakers to Tesla to Google to Uber, a wide range of companies are investing a tremendous amount ...
How to Choose a Sandbox
Blog Published: 04/24/2017
Grab a shovel and start digging through the detailsBy Mathias Wilder, Area Director and General Manager/EMEA Central, ZscalerBusinesses have become painfully aware that conventional approaches — virus signature scanning and URL filtering — are no longer sufficient in the fight against cyberthr...
Mind the Gap
Blog Published: 05/05/2017
By Matt Piercy, Vice President and General Manager EMEA, ZscalerThe sheer number of IT departments that are not acknowledging the numerous security gaps for cyber-attackers to exploit is astonishing. The problem is that many of those within the industry believe they have their security posture...
What You Need to Know About Changes to the STAR Program
Blog Published: 05/09/2017
By Debbie Zaller, CPA, CISSP, PCI QSA, Principal, Schellman & Co., LLCThe CSA recently announced that the STAR Program will now allow a one-time, first-year only, Type 1 STAR Attestation report. What is a Type 1 versus Type 2 examination and what are the benefits for starting with a Type 1...
Data Loss Threatens M&A Deals
Blog Published: 05/11/2017
By Jeremy Zoss, Managing Editor, Code42One of the most popular breakout sessions at Evolution17 featured a great merger and acquisition (M&A) scenario: Midway through the deal, critical information leaks, devastating the value of the deal. How can you figure out how much info leaked—by who...
Malware: Painting a Picture
Blog Published: 05/17/2017
By Jacob Serpa, Product Marketing Manager, BitglassPart OneNow more than ever, companies are flocking to the cloud. Through a variety of software as a service (SaaS) and infrastructure as a service (IaaS), enterprises are able to raise their efficiency, increase their flexibility, and decrease...
CTRL-Z and the Changing Data Landscape
Blog Published: 05/18/2017
By Mark Wojtasiak, Director of Product Marketing, Code42The massive “WannaCry” ransomware attack that appeared in Europe last week and spread to over 150 countries is a perfect illustration of why enterprise data storage is in a period of flux. Today, organizations can choose to keep their dat...
Ransomware 101
Blog Published: 05/19/2017
By Jacob Serpa, Product Marketing Manager, BitglassUnless you’ve been living under a rock for the last few weeks, you know that there has been a notable increase in cyberattacks around the world. Hackers have been spreading a type of ransomware called “WannaCry” via emails that trick recipient...
A Management System for the Cloud – Why Your Organization Should Consider ISO 27018
Blog Published: 05/22/2017
By Alex Hsiung, Senior Associate, Schellman & Co.Cloud computing technologies have revolutionized the way organizations manage and store their information. Where companies used to house and maintain their own data, a host of organizations have now made the switch to a cloud-based model du...
New CSA Report Offers Observations, Recommendations on Connected Vehicle Security
Blog Published: 05/25/2017
By John Yeoh, Research Director/Americas, Cloud Security AllianceConnected Vehicles are in the news for introducing new features and capabilities to the modern automobile. Headlines also highlight security hacks that compromise vehicle operations and usability. While sources note that the vuln...
Want To Empower Remote Workers? Focus On Their Data
Blog Published: 05/31/2017
By Jeremy Zoss, Managing Editor, Code42Here’s a nightmare scenario for IT professionals: Your CFO is working from the road on a high-profile, highly time sensitive business deal. Working late on documentation for the deal, a spilled glass of water threatens everything. His laptop is fried; all...
Office 365 Deployment: Research Suggests Companies Need to “Think Different”
Blog Published: 06/02/2017
Survey shows what companies expected and what they found outBy Atri Chatterjee, Chief Marketing Officer, ZscalerIt’s been six years since Microsoft introduced Office 365, the cloud version of the most widely used productivity software suite. In those years, Office 365 has earned its place as t...
My Second Attempt at Explaining Blockchain to My Wife
Blog Published: 06/07/2017
I tried explaining blockchain to my wife and here’s what happened...By Antony Ma, CTO/PowerData2Go, Founding Chairman/CSA Hong Kong and Macau Chapter, and Board Member/CSA Singapore ChapterI introduced my wife to Python around nine months ago, and now she’s tinkering and has drawn a tortoise o...