Right to Be Forgotten: Guidelines from WP29
Blog Published: 12/02/2014
Update: The final document regarding the right to be forgotten has been published. A new article, which goes more in depth, and analyzes the details of the Guidelines published by the Article 29 Working Party is available here: http://itlawgroup.com/resources/articles/237-right-to-be-forgotten-gu...
The Apple-IBM Alliance: Illuminating the Future of BYOD
Blog Published: 11/26/2014
By Yorgen Edholm, CEO, AccellionThe mobile revolution, while firmly embedded in the consumer world, is now beginning to hit its stride in the enterprise world. This can be seen in the recent announcement from Apple and IBM, whose strategic alliance to develop joint solutions leveraging Apple devi...
Shared Responsibilities for Security in the Cloud, Part 2
Blog Published: 11/25/2014
By Alexander Anoufriev, CISO, ThousandEyesShared Responsibilities for Security in the Cloud continues...Infrastructure Protection ServicesThis domain uses a traditional defense in depth approach to make sure that the data containers and communications channels are secure. For infrastructure prote...
Shared Responsibilities for Security in the Cloud, Part 1
Blog Published: 11/24/2014
By Alexander Anoufriev, CISO, ThousandEyesIntroduction: Security Responsibilities in the Cloud EraWhen businesses owned their applications and all underlying infrastructure, they also owned their security. Now this is changing with a shift in ownership and operational responsibilities over many a...
Lessons from Apple iCloud Data Leak
Blog Published: 11/19/2014
By Paul Skokowski, Chief Marketing Officer, AccellionThe theft of celebrity photos from Apple iCloud is a stark reminder of the need to think twice before storing data. For many people using a Mac the default behavior is to automatically back up and save data to iCloud. It's wonderfully appealing...
Cloud Security Alliance Congress EMEA 2014 To Add New Government Cloud Security Track to Agenda
Press Release Published: 11/17/2014
Expert Presentations to Provide Important Guidance on How Organizations Can Better Address Government Cloud Standards Rome, Italy – November 17, 2014 – The Cloud Security Alliance and MIS Training Institute today announced the introduction of a new Government Cloud Security Track as part of thi...
Cloud Security Alliance EMEA Congress 2014 to Feature Series of Workshops and Working Group Meetings
Press Release Published: 11/13/2014
Rome, Italy – November 12, 2014 - The Cloud Security Alliance (CSA) and MIS Training Institute today announced a series of pre- and post-conference workshops and working group meetings scheduled to take place in conjunction with CSA EMEA Congress 2014 being held November 18-20 at the Parco dei Pr...
Cloud Security Alliance Announces Addition to Keynote Line Up and Plans to Unveil New CSA STAR Tool
Press Release Published: 11/13/2014
Tim Rains of Microsoft to Present on Securing Data for Cloud Computing Rome, Italy – November 13, 2014 - The Cloud Security Alliance (CSA) and MIS Training Institute today announced the addition of keynote presenter Tim Rains, Director, Trustworthy Computing of Microsoft who will speak on “Secur...
From BYOD to WYOD: Get Ahead of Wearable Device Security
Blog Published: 11/11/2014
By Paula Skokowski, Chief Marketing Officer, AccellionWearable technology is the new “it” thing. From FitBit, to Google Glass, to Samsung Galaxy Gear, and now the Apple iWatch, users are literally arming themselves with the latest gadgets. This is particularly true among early adopters who are co...
Cloud Security Alliance EMEA Congress 2014 to Host Amazon Web Services (AWS) Security Architecture Workshop
Press Release Published: 11/10/2014
Registration Now Open for Hands-On Lab for Auditing AWS Cloud Services Rome, Italy – Novemver 6, 2014 - The Cloud Security Alliance (CSA) and MIS Training Institute today announced the addition of an important new workshop, “Auditing Your Amazon Web Services Security Architecture”, scheduled to ...
REST IN PEACE SOC 3 SEAL
Blog Published: 11/05/2014
By Avani Desai, Executive Vice President, BrightLineOn October 2, 2014, the AICPA and CPA Canada announced their joint decision to discontinue the seal programs for Systrust and SOC 3 Systrust for Service Organizations.In their announcement, the AICPA and CPA Canada stated that both of these orga...
Cloud Security Alliance Announces Keynote Presentations for Congress EMEA 2014
Press Release Published: 11/04/2014
Strategic and Practical Presentations by Walmart, Google, RSA, Cannon and the European Union to Spearhead this Year’s Event Rome, Italy – November 4, 2014 – The Cloud Security Alliance and MIS Training Institute today announced the keynote presentation line-up for the upcoming EMEA Congress 201...
The Data Factory: 12 Essential Facts on Enterprise Cloud Usage & Risk
Blog Published: 11/04/2014
By Kamal Shah, VP of Products and MarketingBetween headlines from the latest stories on data breaches and the hottest new apps on the block, it’s easy to be captivated with what people are saying, blogging, and tweeting about the state of cloud adoption and security. But let’s face it: It’s hard ...
Cloud Security Alliance Welcomes TÜV Rheinland as Global Corporate Member
Press Release Published: 11/03/2014
TÜV Rheinland Singapore to Become First CSA STAR Certifying Body in Southeast Asia Suntec, Singapore -- October 30, 2014 -- TÜV Rheinland, a global leader in independent inspection services, and Cloud Security Alliance (CSA), a not-for-profit organization that promotes the use of best practice...
Mobile and Cloud: BFFs 4Ever
Blog Published: 10/29/2014
By Krishna Narayanaswamy, Chief Scientist, NetskopeWe released the Netskope Cloud Report for October today. In it, we analyze the aggregated, anonymized data collected from tens of billions of events across millions of users in the Netskope Active Platform, and highlight key findings about cloud ...
In Plain Sight: How Hackers Exfiltrate Corporate Data Using Video
Blog Published: 10/29/2014
By Kaushik Narayan, Chief Technology Officer, Skyhigh NetworksConsumers and companies are embracing cloud services because they offer capabilities simply not available with traditional software. Cyber criminals are also beginning to use the cloud because it offers scalability and speed for delive...
CSA Seeks Input on Open Peer Review: CSA Quantum-Safe Security Working Group Charter
Press Release Published: 10/24/2014
The Cloud Security Alliance would like to invite you to review and comment on a proposed Quantum-Safe Security Working Group Charter. The focus of the Quantum‐Safe Security working group is on cryptographic methods that will remain safe after the widespread availability of the quantum computer. T...
Mobile Working Group IoT Kickoff Call!
Press Release Published: 10/23/2014
You are invited to participate in the first call for the Mobile Working Group Internet of Things (IoT) Security subgroup. Details are below: Dial in information: DIN: +1.213.226.1066, ID: 674-823-196#, https://join.me/cloudsecurityalliance.org OVERVIEW We'll work through getting us all on the s...
Cloud Security Alliance Software Hackathon Closed. Software Defined Perimeter Prevails Again
Press Release Published: 10/21/2014
Protocol Proves to be Intrinsically Secure Against Network-based Attacks; Full Attack Analysis Coming Soon! Seattle, WA – October 22, 2014 - The Cloud Security Alliance (CSA), a not-for-profit organization which promotes the use of best practices for providing security assurance within cloud c...
CSA Congress US Presentations Available
Press Release Published: 10/20/2014
A message from Jim Reavis, Chief Executive Officer of Cloud Security Alliance: Dear CSA Membership, As we enter into our 6th year of operation, we are seeing tremendous growth in enterprise usage of cloud computing. When we started CSA, cloud was often being used as a pilot or prototype for fu...