Register for CSA’s SECtember conference and trainings today




Circle
Events
Blog

Industry Insights

Read the latest cloud security news, trends, and thought leadership from subject matter experts.

Industry Insights
Securing the Intersection of Sanctioned and Unsanctioned Apps in Cloud Ecosystems
Published: 03/23/2015

If you are in charge of deploying a cloud app or suite like Box, Office 365, or Google Apps in your environment, you need to read this:by Krishna Narayanaswamy, Chief Scientist, NetskopeWe just completed a piece of research here at Netskope on cloud app ecosystems. In it, we highlight an importan...

2015 Bitglass Cloud Security Report : Security Still Cloud's Achilles Heel
Published: 03/12/2015

By Christopher Hines, Product Marketing Manager, BitglassThe cloud. Companies want it, but can they secure it? Moving to cloud applications like Salesforce, Office 365 and Box, can be beneficial for business but companies must first answer the question of security. Today we announced the finding...

A Few Lessons from Recent Adware Insecurities
Published: 03/11/2015

<strong>Recent adware has made significant waves in some information security </strong><strong>circles for its security vulnerabilities and </strong><strong>for its potential larger </strong><strong>impact on one of the essential systems of trust that Internet </strong><strong>sites use – the Bro...

24 Hours After FREAK, 766 Cloud Providers Still Vulnerable
Published: 03/06/2015

The Average Company Uses 122 FREAK-vulnerable servicesBy Sekhar Sarukkai, Co-founder and VP of Engineering, Skyhigh NetworksThis week a group of researchers at INRA, Microsoft Reseach, and IMDEA discovered a widespread vulnerability in OpenSSL that has rendered millions of Apple and Android devic...

What Does Customer Managed Encryption Keys Really Mean for Cloud Service Providers?
Published: 03/06/2015

By Todd Partridge, Director of Strategy, IntralinksHave you ever leased a safety deposit box from your bank? For years the security and privacy of a safe deposit box has been the standard in the physical world. People have put their most important and their most valued information in bank vaults ...

Why Companies Must Adopt the ‘Assume Mentality’ When It Comes to Breaches
Published: 02/27/2015

By Christopher Hines, Product Marketing Manager, BitglassRecently Target announced that the credit card data breach that they suffered back in 2013 ended up costing them $162M. Now, I know some may argue that to a company like Target, that number is a drop in the bucket, and you’re right. But the...

The Dark Side of the Web: 14 Essential Cloud Usage Facts Every CISO Should Know
Published: 02/12/2015

By Kamal Shah, Vice President, Products and Marketing, SkyHigh NetworksBetween frequent headlines on data breaches and the growth of Shadow IT, it is easy to be captivated with what people are saying, blogging, and tweeting about the state of cloud adoption and security. But the fact is – it’s ha...

Anthem’s Breach and the Ubiquity of Compromised Credentials
Published: 02/09/2015

By Sekhar Sarukkai, Co-Founder and VP of Engineering, Skyhigh NetworksThe year is still young, and we’ve already witnessed a breach of potentially historic proportions. Anthem Inc, the nation’s second largest health insurer, released a statement last week announcing the breach of a database with ...

What The Anthem Breach Means For Healthcare Security
Published: 02/06/2015

By Christopher Hines, Product Marketing Manager, Bitglass"Healthcare orgs oh how we love you so, with your data so un secured no wonder we give it a go. SSNs, birthdays and addresses information galore, we can’t wait until next year when we steal some more.”This is the song that healthcare data t...

Cutting Out The Security Blind Spots
Published: 01/30/2015

By Chris Hines, Product Marketing Manager, Bitglass When Henry Ford’s Model T was introduced to the world in 1908, with a list price of $850, it revolutionized transportation for the masses at the time. What many folks don’t know is that it had absolutely no mirrors attached to it. Ear...

Limit The Damage
Published: 01/23/2015

By Chris Hines, Product Marketing Manager, BitglassDespite investments in security, breaches are still occurring at an alarming rate. Whether the result of the world’s nefarious cyber criminals sending phishing or malware attacks through company emails, or insiders simply misusing sensitive data....

The Truth About Encryption
Published: 01/20/2015

By Christopher Hines, Product Marketing Manager, Bitglass“Encryption is the conversion of electronic data into another form, called ciphertext, which cannot be easily understood by anyone except authorized parties.” – TechTargetEncryption has gotten some much-needed attention over the past few w...

CSA Survey: Security of Cloud Data Now a Board-Level Concern
Published: 01/12/2015

Security and Skills Gap Hold Back Cloud Projects While Shadow IT GrowsBy Cameron Coles, Sr. Product Marketing Manager, SkyhighA recent Cloud Security Alliance & Skyhigh survey shows that while security and skills gaps remain significant barriers to corporate-sanctioned cloud projects, end users a...

Compromised Credentials: A Risk for Your Business-Critical Cloud Apps
Published: 01/08/2015

By Krishna Narayanaswamy, Chief Scientist, NetskopeWe are excited to announce the release of the January Netskope Cloud Report today. In it, we have our standard stuff – the latest cloud adoption numbers (this quarter, we report an average of 613 cloud apps per enterprise), as well as observed a...

10 Must-Haves from “Cloud Security for Dummies”
Published: 01/06/2015

By Krishna Narayanaswamy, Chief Scientist, NetskopeWe are excited to announce the availability of “Cloud Security for Dummies,” a book that my co-founders and fellow chief architects and I collaborated on based on our interactions with the most forward-thinking CIOs, CISOs, and cloud architects f...

Zen and the Art of Acing Your Cloud Compliance Audit
Published: 12/09/2014

By Mike Pav, VP of Engineering, Spanning by EMCWe all know cloud adoption is rampant, even though cloud security remains a big concern; a recent study from CloudEntr showed that 89% of IT pros said they were worried about cloud security. While IT admins are busy ensuring compliance for sanctioned...

CSA Guide to Cloud Computing – Now Available
Published: 12/04/2014

By Jim Reavis, Executive Director CSA (Twittter @jimreavis); Brian Honan, President CSA Chapter Ireland (Twitter @BrianHonan); and Raj Samani, Chief Innovation Officer CSA & EMEA CTO Intel Security (Twitter @Raj_Samani)We are pleased to announce the availability of “CSA Guide to Computing: Implem...

Right to Be Forgotten: Guidelines from WP29
Published: 12/02/2014

Update: The final document regarding the right to be forgotten has been published. A new article, which goes more in depth, and analyzes the details of the Guidelines published by the Article 29 Working Party is available here: http://itlawgroup.com/resources/articles/237-right-to-be-forgotten-gu...

The Apple-IBM Alliance: Illuminating the Future of BYOD
Published: 11/26/2014

By Yorgen Edholm, CEO, AccellionThe mobile revolution, while firmly embedded in the consumer world, is now beginning to hit its stride in the enterprise world. This can be seen in the recent announcement from Apple and IBM, whose strategic alliance to develop joint solutions leveraging Apple devi...

Shared Responsibilities for Security in the Cloud, Part 2
Published: 11/25/2014

By Alexander Anoufriev, CISO, ThousandEyesShared Responsibilities for Security in the Cloud continues...Infrastructure Protection ServicesThis domain uses a traditional defense in depth approach to make sure that the data containers and communications channels are secure. For infrastructure prote...

Browse by Topic
Write for the CSA blog
Submit your blog proposal

Sign up to receive CSA's latest blogs

This list receives 1-2 emails a month.