Who Touched My Data?
Blog Published: 06/09/2017
You don’t know what you don’t knowBy Yael Nishry, Vice President of Business Development, Vaultive, and Arthur van der Wees, Founder and Managing Director, Arthur's LegalRansomwareIT teams generally use encryption to enable better security and data protection. However, in the hands of maliciou...
Crank Up Your Cloud Security Knowledge with These Upcoming Webinars
Blog Published: 06/12/2017
By Hillary Barron, Research Analyst and CloudBytes Program Manager, Cloud Security AllianceWhether you’re trying to make the move to cloud while managing an outdated endpoint backup, attempting to figure out how to overcome the challenges pertaining to developing and deploying security automat...
Clouding Within the Lines: Keeping User Data Where It Belongs in the Age of GDPR
Blog Published: 07/03/2017
By Nathan Narayanan, Director of Product Management, NetskopeImportance around data residency hygiene has been around for a long time, but cloud services that often show up tend to focus more on user productivity and less on user data privacy. The highly-productive nature of these services inc...
Locking-in the Cloud: Seven Best Practices for AWS
Blog Published: 07/06/2017
By Sekhar Sarukkai, Co-founder and Chief Scientist, Skyhigh Networks With the voter information of 198 million Americans exposed to the public, the Deep Root Analytics leak brought cloud security to the forefront. The voter data was stored in an AWS S3 bucket with minimal protection. In fact, ...
CSA Industry Blog Listed Among 100 Top Information Security Blogs for Data Security
Blog Published: 07/10/2017
Our blog was recently ranked 35th among 100 top information security blogs for data security professionals by Feedspot. Among the other blogs named to the list were The Hacker News, Krebs on Security and Dark Reading. Needless to say, we're honored to be in such good company. To be listed, ...
Cyberattacks Are Here: Security Lessons from Jon Snow, White Walkers & Others from Game of Thrones
Blog Published: 07/19/2017
An analysis of Game of Thrones characters as cyber threats to your enterprise.By Virginia Satrom, Senior Public Relations Specialist, ForcepointAs most of you have probably seen, we recently announced our new human point brand campaign. Put simply, we are leading the way in making security not...
Patch Me If You Can
Blog Published: 07/24/2017
By Yogi Chandiramani, Technical Director/EMEA, ZscalerIn May, the worldwide WannaCry attack infected more than 200,000 workstations. A month later, just as organizations were regaining their footing, we saw another ransomware attack, which impacted businesses in more than 65 countries.What hav...
Guidance for Critical Areas of Focus in Cloud Computing Has Been Updated
Blog Published: 07/26/2017
Newest version reflects real-world security practices, future of cloud computing securityBy J.R. Santos, Executive Vice President of Research, Cloud Security AllianceToday marks a momentous day not only for CSA but for all IT and information security professionals as we release Guidance for Cr...
Is the Cloud Moving Too Fast for Security?
Blog Published: 07/28/2017
By Doug Lane, Vice President/Product Marketing, VaultiveIn February 2017, a vulnerability in Slack was discovered which had the potential to expose the data of the company’s reported four million daily active users. Another breach in February on CloudFlare, a content delivery network, leaked s...
Ransomware Explained
Blog Published: 08/18/2017
By Ryan Hunt, PR and Content Manager, SingleHopHow it Works — Plus Tips for Prevention & Recovery Ransomware attacks — a type of malware (a.ka. malicious software) — are proliferating around the globe at a blistering pace. In Q1 2017, a new specimen emerged every 4.2 seconds!* What makes...
Security Needs Vs. Business Strategy – Finding a Common Ground
Blog Published: 08/21/2017
By Yael Nishry, Vice President of Business Development, VaultiveEven before cloud adoption became mainstream, it wasn’t uncommon for IT security needs to conflict with both business strategy and end user preferences. Almost everyone with a background in security has found themselves in the awk...
Improving Metrics in Cyber Resiliency: A Study from CSA
Blog Published: 08/30/2017
By Dr. Senthil Arul, Lead Author, Improving Metrics in Cyber Resiliency With the growth in cloud computing, businesses rely on the network to access information about operational assets being stored away from the local server. Decoupling information assets from other operational assets could...
Webinar: How Threat Intelligence Sharing Can Help You Stay Ahead of Attacks
Blog Published: 09/27/2017
By Lianna Catino, Communications Manager, TruSTAR TechnologyAccording to a recent Ponemon Institute survey of more than 1,000 security practitioners, 84 percent say threat intelligence is "essential to a strong security posture," but the data is too voluminous and complex to be actionable.Ente...
The GDPR and Personal Data…HELP!
Blog Published: 10/04/2017
By Chris Lippert, Senior Associate, Schellman & Co.With the General Data Protection Regulation (GDPR) becoming effective May 25, 2018, organizations (or rather, organisations) seem to be stressing a bit. Most we speak with are asking, “where do we even start?” or “what is included as perso...
CSA Releases Minor Update to CCM, CAIQ
Blog Published: 10/19/2017
By the CSA Research TeamThe Cloud Security Alliance has released a minor update for the Cloud Control Matrix (CCM) and the Consensus Assessment Initiative Questionnaire (CAIQ) v3.0.1. This update incorporates mappings to Shared Assessments 2017 Agreed Upon Procedures (AUP), PCI DSS v3.2, CIS-A...
Days of Our Stolen Identity: The Equifax Soap Opera
Blog Published: 10/26/2017
By Kate Donofrio, Senior Associate, Schellman & Co.The Equifax saga continues like a soap opera, Days of Our Stolen Identity. Every time it appears the Equifax drama is ending, a new report surfaces confirming additional security issues.On Thursday, September 12, NPR reported that Equifax...
IT Sales in the Age of the Cloud
Blog Published: 11/09/2017
By Mathias Widler, Regional Sales Director, ZscalerThe cloud is associated not only with a change in corporate structures, but also a transformation of the channel and even sales itself. Cloudification makes it necessary for sales negotiations to be held with decision-makers in different depar...
Your Morning Security Spotlight
Blog Published: 11/21/2017
By Jacob Serpa, Product Marketing Manager, BitglassThe top cybersecurity stories of the week revolved around malware and breaches. Infections and data theft remain very threatening realities for the enterprise.400 Million Malware Infections in Q3 of 2017In the last few months, malware has succ...
Four Important Best Practices for Assessing Cloud Vendors
Blog Published: 11/24/2017
By Nick Sorensen, President & CEO, Whistic When it comes to evaluating new vendors, it can be challenging to know how best to communicate the requirements of your vendor assessment process and ultimately select the right partner to help your business move forward — while at the same time a...
AWS Cloud: Proactive Security & Forensic Readiness
Blog Published: 12/01/2017
This post kicks off a series examining proactive security and forensic readiness in the AWS cloud environment. By Neha Thethi, Information Security Analyst, BH Consulting In a time where cyber-attacks are on the rise in magnitude and frequency, being prepared during a security incident is par...