More phishing attacks on Yahoo and Gmail SMS 2FA
The second report in a week has analysed phishing attacks that are attempting – and probably succeeding – in bypassing older forms of two-factor authentication (2FA).
The second report in a week has analysed phishing attacks that are attempting – and probably succeeding – in bypassing older forms of two-factor authentication (2FA).
We ring out 2018 with a look at the big issues of the past year. Listen and enjoy!
We walk you through the important settings you can change and behaviors you can implement to lock down your privacy on Facebook.
There’s no need to make it easier for someone who wants to hijack your Twitter account. Here’s how to lock it down in just a few minutes.
It’s a good idea to set up multi-factor authentication (2FA) on all your social accounts, so here we explain how to do that for Instagram.
Joins world-class speaker line-up of federal and cybersecurity experts Seattle, WA – May 11, 2018 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment, announced today that Bob Gourley, former CTO of the Defense Intelligence Agency and former Director of Intelligence (J2) at the Department of Defense’s cyber defense organization, JTF-CND, has been confirmed…
System to be based on a common framework for deployment, use and maintenance Seattle, WA– May 14, 2018 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment, today announces that it has partnered with the Federal Risk and Authorization Management Program (FedRAMP), at the U.S. General Services Administration (GSA), to implement a system for the recognition be…
Report offers an overview of challenges involved with future of data security SEATTLE, WA – May 23, 2018 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment, today released its newest report, “The State of Post-Quantum Cryptography.” The report provides an overview of the current state of public-key cryptography, as well the threat posed by quantum …
In February, the Cloud Security Alliance released ”The State of ERP Security in the Cloud” to provide IT and management professionals with a sound overview of cloud security for ERP systems. The following survey will attempt to better understand cloud preparation and migration, features and benefits gained, and the security and privacy challenges for an ERP Solution in a cloud environment. ERP and Cloud Adoption Survey https://www.surveymonkey.com/r/ERPandCloudMigration Estimated time to c…
New mechanisms offer vested parties structured, transparent path to meeting personal data protection requirements SEATTLE, WA and LONDON – JUNE 5, 2018 – InfoSecurity Europe Conference – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications and best practices to help ensure a secure cloud computing environment, today released the CSA Code of Conduct (CoC) Self-Assessment. An essential tool for those charged with General Data P…