Mind the Gap

By Matt Piercy, Vice President and General Manager EMEA, Zscaler The sheer number of IT departments that are not acknowledging the numerous security gaps for cyber-attackers to exploit is astonishing. The problem is that many of those within the industry believe they have their security posture under control but they haven’t looked at the wider picture. […]

Read more...

How to Choose a Sandbox

Grab a shovel and start digging through the details By Mathias Wilder, Area Director and General Manager/EMEA Central, Zscaler Businesses have become painfully aware that conventional approaches — virus signature scanning and URL filtering — are no longer sufficient in the fight against cyberthreats. This is in part because malware is constantly changing, generating new signatures with […]

Read more...

Self-Driving Information Security

By Jim Reavis, Co-founder and CEO, Cloud Security Alliance The prospects of autonomous self-driving vehicles becoming a pervasive presence on our roadways seems more likely everyday. From the big automakers to Tesla to Google to Uber, a wide range of companies are investing a tremendous amount of money to create a world without carbon-based drivers. […]

Read more...

There May Be a Shark Circling Your Data

By Jacob Serpa, Product Marketing Manager, Bitglass In today’s business environment, cybersecurity remains a topic of great importance. As more companies migrate to the cloud, security concerns continue to evolve. While BYOD (bring your own device) affords employees more flexibility as they work from a multitude of devices, it also exposes data to nefarious parties in […]

Read more...

The Cure for Infectious Malware

By Chantelle Patel, Marketing Manager, Bitglass Organizations have seen rapid growth in cloud adoption over the last few years which in turn have introduced new threats and increased the risk of data leakage. Among the most prominent threats are malware and ransomware – long a problem on endpoints. With the advent of public cloud apps, interconnected […]

Read more...

Why You Need a CASB for GDPR Compliance

By Rich Campagna, Senior Vice President/Products & Marketing, Bitglass With enforcement of the EU’s General Data Protection Regulation (GDPR) is just over a year away in May, 2018, your planning efforts should already be well underway. Adoption of cloud applications across the EU continues at a rapid clip, and the global nature of leading cloud […]

Read more...

CASB Is Eating the IDaaS Market

By Rich Campagna, Senior Vice President/Products & Marketing, Bitglass In the past 6-9 months, I’ve noticed a trend amongst Bitglass customers where more and more of them are opting to use the identity capabilities built into our  Cloud Access Security Broker (CASB) in lieu of a dedicated Identity as a Service (IDaaS) product. As CASB identity functionality has […]

Read more...

Brexit or Bust: What Does It Mean for Data?

By Nic Scott, Managing Director/UK, Code 42 What’s the latest on Brexit? When the UK government triggers Article 50, it will signal the start of the official two-year countdown until the UK leaves the European Union. According to UK Prime Minister Theresa May, this is still on track to happen at some point in March. While […]

Read more...

Odds Are in Quantum Encryption’s Favor

By Jane Melia, Vice President of Strategic Business Development , QuintessenceLabs and Co-chair, CSA Quantum-safe Security Working Group No kinds of organizations have tighter security than the average casino. After all, the house always wins, and it wants to keep those winnings. A recent Wired article, however, explains how a team of Russian hackers managed to beat a lot […]

Read more...

Observations on CSA Summit at RSA – Part 1

By Katie Lewin, Federal Director, Cloud Security Alliance CSA Summit at RSA was a day-long session on Securing the Converged Cloud organized around presentations and panels from leading vendors such as Centrify, Veracode, Microsoft, and Netskope, as well as a talk on “Effective Cybersecurity” by Ret. Gen. Keith Alexander and a fireside chat with Robert Herjavec […]

Read more...

Preparing for the Quantum Future: Setting Global Security Standards to Make Us Quantum-Safe

By Frank Guanco, Quantum-Safe Security Working Group, Cloud Security Alliance Recently there has been an increase in the perceived threat of the quantum computer to modern cryptographic standards in widespread use. During the last year, security agencies such as the United States Government National Security Agency (NSA) and the United Kingdom’s Communications Electronics Security Group […]

Read more...

Market & Technology Readiness (MTRLs)

By Frank Khan Sullivan, Vice President/Marketing, Strategic Blue There is a need to communicate a project’s maturity to a non-technical audience. The Market & Technology Readiness Level Framework [PDF] aims to provide decision makers with a holistic view of a project’s maturity in a simple way – with a single score. It offers a faster […]

Read more...

Prepare for Windows 10 Migration the Gartner Way

By Jeremy Zoss, Managing Editor, Code42 It’s 2017, which means there’s a good chance your company is preparing to migrate to Windows 10. The operating system may have launched back in 2015, but this is the year that Gartner predicts enterprise adoption of the operating system will truly take off, hitting its peak in 2020. What […]

Read more...

Is Your Industry at High Risk of Insider Threat?

By Jeremy Zoss, Managing Editor, Code42 In the movies, data theft is usually the work of outsiders. You’ve witnessed the scene a million times: A cyber thief breaks into a business, avoiding security measures, dodging guards and employees, and making off with a USB stick of valuable data seconds before he or she would have been […]

Read more...

The Rise in SSL-based Threats

By Derek Gooley, Security Researcher, Zscaler Overview The majority of Internet traffic is now encrypted. With the advent of free SSL providers like Let’s Encrypt, the move to encryption has become easy and free. On any given day in the Zscaler cloud, more than half of the traffic that inspected uses SSL. It is no surprise, […]

Read more...

Avoid the Heartbreak of Insider Threat

By Ashley Jarosch, Manager/Marketing Programs, Code42 While everyone else is celebrating love and romance this Valentine’s Day, here at Code42 we’re reflecting on heartbreak—specifically, the heartbreak of insider threat. The Heartbreak and Betrayal of Insider Threat It’s a feeling anyone in the enterprise world is familiar with. Someone you trust—someone you hired, work with, maybe even […]

Read more...

The New CSA Consultancy Program Will Ensure Best Practices in Secure Cloud Implementation

By Daniele Catteddu, Chief Technology Officer, CSA As increasing numbers of enterprises begin the move to the cloud in earnest, there has simultaneously developed a host of third-party consultancy firms, offering guidance on cloud technology best practices and implementation. Recognizing that there is a genuine need for a trusted network, where organizations and professionals can […]

Read more...

New Security Research – the Software-Defined Perimeter for the Cloud

By Jason Garbis, Vice President of Products, Cryptzone On behalf of the Cloud Security Alliance, I’m pleased to announce the publication of our newest security research from the Software Defined Perimeter (SDP) Working Group, exploring how the SDP can be applied to Infrastructure-as-a-Service environments. Thanks to all the people who commented and contributed to this research […]

Read more...

3-2-1, Takeoff. The STARWatch Cloud Security Management Application Has Launched

By Daniele Catteddu, Chief Technology Officer, Cloud Security Alliance Compliance, assurance and vendor management are becoming more and more complex and resource-intensive issues, so we created STARWatch, a Software as a Service (SaaS) application designed to provide organizations a centralized way to manage and maintain the integrity of the vendor review and assessment process. Today, […]

Read more...