ChaptersEventsBlog
Get Free Early Access to TAISE Module 3! Sample the Certificate Experience Today!

All Articles

All Articles
Deciphering DevSecOps

Blog Published: 02/07/2019

Security needs to be an integral part of the DevOps roadmap. Enterprise Strategy Group’s Doug Cahill shows the way By Beth Stackpole, Writer, SymantecSecurity has moved to the forefront of the IT agenda as organizations push forward with digital transformation initiatives. At the same time, ...

The 12 Most Critical Risks for Serverless Applications

Blog Published: 02/11/2019

By Sean Heide, CSA Research Analyst and Ory Segal, Israel Chapter Board MemberWhen building the idea and thought process around implementing a serverless structure for your company, there are a few key risks one must take into account to ensure the architecture is gathering proper controls whe...

Security Spotlight: Financial Services Facing Cyberattacks

Blog Published: 02/12/2019

By Will Houcheime, Product Marketing Manager, BitglassHere are the top cybersecurity stories of recent months:—Customer information exposed in Bankers Life hack—American Express India leaves customers defenseless—Online HSBC accounts breached—Millions of dollars taken from major Pakistani bank...

Rethinking Security for Public Cloud

Blog Published: 02/13/2019

Symantec’s Raj Patel highlights how organizations should be retooling security postures to support a modern cloud environmentBy Beth Stackpole, Writer, SymantecEnterprises have come a long way with cyber security, embracing robust enterprise security platforms and elevating security roles and ...

Rocks, Pebbles, Shadow IT

Blog Published: 02/19/2019

By Rich Campagna, Chief Marketing Officer, Bitglass Way back in 2013/14, Cloud Access Security Brokers (CASBs) were first deployed to identify Shadow IT, or unsanctioned cloud applications. At the time, the prevailing mindset amongst security professionals was that cloud was bad, and discoveri...

Bitglass Security Spotlight: DoD, Facebook & NASA

Blog Published: 02/25/2019

By Will Houcheime, Product Marketing Manager, BitglassHere are the top cybersecurity stories of recent weeks: —Cybersecurity vulnerabilities found in US missile system—Facebook shares private user data with Amazon, Netflix, and Spotify—Personal information of NASA employees exposed—Chinese nat...

Five Years of the GitHub Bug Bounty Program

Blog Published: 02/28/2019

By Philip Turnbull, Senior Application Security Engineer, GitHubThis article was originally published by the GitHub team.GitHub launched our Security Bug Bounty program in 2014, allowing us to reward independent security researchers for their help in keeping GitHub users secure. Over the past ...

Introducing CAIQ-Lite

Blog Published: 03/01/2019

By Dave Christiansen, Marketing Director, WhisticThe Cloud Security Alliance and Whistic are pleased to release CAIQ-Lite beta, a new framework for cloud vendor assessment.CSA and Whistic identified the need for a lighter-weight assessment questionnaire in order to accommodate the shift to clo...

Education: A Cloud Security Investigation (CSI)

Blog Published: 03/05/2019

By Will Houcheime, Product Marketing Manager, BitglassCloud computing is now widely used in higher education. It has become an indispensable tool for both the institutions themselves and their students. This is mainly because cloud applications, such as such as G Suite and Microsoft Office 365...

A Decade of Vision

Blog Published: 03/05/2019

By Jim Reavis, Co-founder and CEO, Cloud Security Alliance Developing a successful and sustainable organization is dependent upon a lot of factors: quality services, a market vision, focus, execution, timing and maybe a little luck. For Cloud Security Alliance, now celebrating our 10th...

CCSK Success Stories: From an Information Systems Security Manager

Blog Published: 03/07/2019

By the CSA Education TeamThis is the third part in a blog series on Cloud Security Training. Today, we will be interviewing Paul McAleer. Paul is a Marine Corps veteran and currently works as an Information Systems Security Manager (ISSM) at Novetta Solutions, an advanced data analytics compan...

CSA Summit Recap Part 1: Enterprise Perspective

Blog Published: 03/08/2019

By Elisa Morrison, Marketing Intern, Cloud Security AllianceCSA’s 10th anniversary, coupled with the bestowal of the Decade of Excellence Awards gave a sense of accomplishment to this Summit that bodes well yet also challenges the CSA community to continue its pursuit of excellence. The common...

CSA Summit Recap Part 2: CSP & CISO Perspective

Blog Published: 03/12/2019

By Elisa Morrison, Marketing Intern, Cloud Security AllianceWhen CSA was started in 2009, Uber was just a German word for 'Super' and all CSA stood for was Community Supported Agriculture. Now in 2019, spending on cloud infrastructure has finally exceeded on-premises, and CSA is celebrating it...

Webinar: The Ever Changing Paradigm of Trust in the Cloud

Blog Published: 03/12/2019

By CSA StaffThe CSA closed its 10th annual Summit at RSA on Monday, and the consensus was that the cloud has come to dominate the technology landscape and revolutionize the market, creating a tectonic shift in accepted practice. The advent of the cloud has been a huge advancement in technology...

Are Cryptographic Keys Safe in the Cloud?

Blog Published: 03/18/2019

By Istvan Lam, CEO, TresoritBy migrating data to the cloud, businesses can enjoy scalability, ease of use, enhanced collaboration and mobility, together with significant cost savings. The cloud can be especially appealing to subject-matter experts as they no longer have to invest in building ...

Continuous Auditing - STAR Continuous - Increasing Trust and Integrity

Blog Published: 03/19/2019

By John DiMaria, Assurance Investigatory Fellow, Cloud Security AllianceAs a SixSigma Black Belt I was brought up over the years with the philosophy of continual monitoring and improvement, moving from a reactive state to a preventive state. Actually, I wrote a white paper a couple of years ag...

Better Vulnerability Management: How to Master Container Security in Three Steps

Blog Published: 03/21/2019

By Nate Dyer, Product Marketing Director, TenableApplication containers like Docker have exploded in popularity among IT and development teams across the world. Since its inception in 2013, Docker software has been downloaded 80 billion times and more than 3.5 million applications have been “d...

12 Ways Cloud Upended IT Security (And What You Can Do About It)

Blog Published: 03/25/2019

This article was originally published on Fugue's blog here.By Andrew Wright, Co-founder & Vice President of Communications, FugueThe cloud represents the most disruptive trend in enterprise IT over the past decade, and security teams have not escaped turmoil during the transition. It’s und...

Healthcare Breaches and the Rise of Hacking and IT Incidents

Blog Published: 03/27/2019

By Jacob Serpa, Product Marketing Manager, BitglassIn the course of their day-to-day operations, healthcare organizations handle an extensive amount of highly sensitive data. From Social Security numbers to medical record numbers and beyond, it is imperative that these personal details are pro...

CSA STAR – The Answer to Less Complexity and Higher Level of Compliance

Blog Published: 03/28/2019

By John DiMaria, Assurance Investigatory Fellow, Cloud Security AllianceCSA STAR enables a higher level of compliance, data governance, reduced risk and more cost-effective management of your security and privacy systemWe just launched a major refresh of the CSA STAR (Security, Trust and Assur...

Looking for the CCM?

Start using the Cloud Controls Matrix to simplify compliance with multiple standards & regulations.