Additionally, experiments with a new piece of zero-day malware yielded shocking results. They present three concepts and force individuals to select the one that they see as the least important.The tradeoffs between convenience, privacy, and security serve as a perfect example of a “Pick two” situation...Cloud Security Alliance Releases Candidate Mapping of ISO 27002/27017/27018 Security Controls At the Cloud Security Alliance Summit San Francisco 2016, the CSA announced the release of the Candidate Mappings of ISO 27002/27017/27018 to version 3.0.1 of the CSA Cloud Controls Matrix (CCM).The ISO 27XXX series provides an overview of information security management systems. A research document outlining the six dimensions of big data to help decision makers navigate the myriad choices in compute and storage infrastructures as well as data analytics techniques, and security and privacy frameworks.The references and overview of each anecdote and example…Description: The State of ERP Security in the Cloud briefly highlights some of the issues and challenges of migrating ERP solutions to the cloud.
I., the Next-Gen CASB company uncovered startling information about the rate of malware infection amongst organizations. February 15, 2018By Kevin Lee, Systems QA Engineer, Bitglass Have you ever seen a “Pick two out of three” diagram?Mobile devices empower employees to do what they need to do — whenever and wherever.People can work and collaborate “in the field” with customers, partners, patients or students and each other.Learn more Description: The State of ERP Security in the Cloud briefly highlights some of the issues and challenges of migrating ERP solutions to the cloud.The document examines common security and privacy risks that organizations might incur during a transition to the cloud, as well as how organizations have mitigated these hazards.February 23, 2018By Salim Hafid, Product Marketing Manager, Bitglass Many in the security industry have heard about CASBs (cloud access security brokers) as the go-to solutions for data and threat protection in the cloud. If you already have a NGFW (next-gen firewall) or perhaps a secure-web-gateway-type solution, why...February 21, 2018By Kyle Watson, Partner, Information Security, Cedrus Over the past 18 months, I’ve been working on CASB in some form or another including: —Educational architectural and technical videos —Request for Proposal (RFP) assistance —Pre-sales presentations and demos —Proof of Concepts (POCs) —Implementation —Operations build-out and transition I’ve discovered some interesting things...The Enterprise Architecture is both a methodology and a set of tools that enable security architects, enterprise architects and risk management professionals to leverage a common set of solutions that fulfill their common needs to be able to assess where their internal IT and their cloud providers are in terms of security capabilities and to plan a roadmap to meet the security needs of their business.The Outline provides a structure for Cloud Service Providers (CSP) to disclose, in a consistent matter, information about the privacy and data protection policies, procedures and practices used when processing personal data that customers upload or store in the CSP’s servers.But they need to be supported with always current operational processes and information, whether from apps, the Internet, or documents from other people.The CSA guidance as it enters its third edition seeks to establish a stable, secure baseline for cloud operations.