All Articles

All Articles
CSA to Host Inaugural Summit in Boston

Press Release Published: 04/03/2017

First Annual Boston Event to Focus on Cloud Revolution and Accelerating Business BOSTON, MA – April 3, 2017 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment, tod...

CASB Is Eating the IDaaS Market

Blog Published: 03/31/2017

By Rich Campagna, Senior Vice President/Products & Marketing, Bitglass In the past 6-9 months, I've noticed a trend amongst Bitglass customers where more and more of them are opting to use the identity capabilities built into our  Cloud Access Security Broker (CASB) in lieu of a dedicated Id...

Brexit or Bust: What Does It Mean for Data?

Blog Published: 03/23/2017

By Nic Scott, Managing Director/UK, Code 42 What’s the latest on Brexit? When the UK government triggers Article 50, it will signal the start of the official two-year countdown until the UK leaves the European Union. According to UK Prime Minister Theresa May, this is still on track to happen at...

Odds Are in Quantum Encryption’s Favor

Blog Published: 03/22/2017

By Jane Melia, Vice President of Strategic Business Development , QuintessenceLabs and Co-chair, CSA Quantum-safe Security Working Group [caption id="attachment_3386" align="alignleft" width="227"] Image credit: Jeff Kubina[/caption] No kinds of organizations have tighter security than the aver...

CSA Launches 2 New Research Working Groups with Huawei - Call for Participation

Article Published: 03/15/2017

In our mission to build a more secure Cloud ecosystem, the Cloud Security Alliance (CSA) is commencing on working on 2 new research working groups together with our executive member Huawei. Cloud Component Specifications WG Looking at the current environment, there are several internationally re...

Observations on CSA Summit at RSA – Part 1

Blog Published: 03/15/2017

By Katie Lewin, Federal Director, Cloud Security AllianceCSA Summit at RSA was a day-long session on Securing the Converged Cloud organized around presentations and panels from leading vendors such as Centrify, Veracode, Microsoft, and Netskope, as well as a talk on “Effective Cybersecurity” by R...

Preparing for the Quantum Future: Setting Global Security Standards to Make Us Quantum-Safe

Blog Published: 03/13/2017

By Frank Guanco, Quantum-Safe Security Working Group, Cloud Security Alliance Recently there has been an increase in the perceived threat of the quantum computer to modern cryptographic standards in widespread use. During the last year, security agencies such as the United States Government Nati...

Call for Participation: SaaS Governance Working Group

Article Published: 03/13/2017

The Cloud Security Alliance would like to invite you to participate in the SaaS Governance Working Group. The SaaS Governance working group aims to benefit all parties in the Software-as-a-Service (SaaS) ecosystem by supporting a common understanding of SaaS related risks from the perspectives of...

Market & Technology Readiness (MTRLs)

Blog Published: 03/09/2017

By Frank Khan Sullivan, Vice President/Marketing, Strategic Blue There is a need to communicate a project’s maturity to a non-technical audience. The Market & Technology Readiness Level Framework [PDF] aims to provide decision makers with a holistic view of a project’s maturity in a simple w...

Prepare for Windows 10 Migration the Gartner Way

Blog Published: 03/08/2017

By Jeremy Zoss, Managing Editor, Code42 It’s 2017, which means there’s a good chance your company is preparing to migrate to Windows 10. The operating system may have launched back in 2015, but this is the year that Gartner predicts enterprise adoption of the operating system will truly take off...

Searching for Blockchain Co-Chair

Article Published: 02/27/2017

CSA is searching for another co-chair to help lead the Blockchain / Distributed Ledger working group who is preferably from the financial side. Being a co-chair of the work group presents great opportunities such as networking and interacting closely with volunteers representing some of the top m...

Is Your Industry at High Risk of Insider Threat?

Blog Published: 02/24/2017

By Jeremy Zoss, Managing Editor, Code42 In the movies, data theft is usually the work of outsiders. You’ve witnessed the scene a million times: A cyber thief breaks into a business, avoiding security measures, dodging guards and employees, and making off with a USB stick of valuable data seconds...

The Rise in SSL-based Threats

Blog Published: 02/23/2017

By Derek Gooley, Security Researcher, Zscaler Overview The majority of Internet traffic is now encrypted. With the advent of free SSL providers like Let’s Encrypt, the move to encryption has become easy and free. On any given day in the Zscaler cloud, more than half of the traffic that inspected...

The Growth of Macs in the Enterprise Is Challenging the PC’s Dominance

Blog Published: 02/22/2017

By Jeremy Zoss, Managing Editor, Code42 The PC has long been the default choice for business computers, but perhaps not for much longer. The growth of Macs in the enterprise has been exponential in recent years, as illustrated by the infographic below. For context on why Macs are growing in pop...

Avoid the Heartbreak of Insider Threat

Blog Published: 02/14/2017

By Ashley Jarosch, Manager/Marketing Programs, Code42 While everyone else is celebrating love and romance this Valentine’s Day, here at Code42 we’re reflecting on heartbreak—specifically, the heartbreak of insider threat. The Heartbreak and Betrayal of Insider Threat It’s a feeling anyone in th...

The New CSA Consultancy Program Will Ensure Best Practices in Secure Cloud Implementation

Blog Published: 02/13/2017

By Daniele Catteddu, Chief Technology Officer, CSA As increasing numbers of enterprises begin the move to the cloud in earnest, there has simultaneously developed a host of third-party consultancy firms, offering guidance on cloud technology best practices and implementation. Recognizing that th...

Cloud Security Alliance Establishes New Third-Party Consultancy Program to Ensure Best Practices in Secure Cloud Implementation

Press Release Published: 02/13/2017

CSA Names Optiv As First Certified Provider for New Program SAN FRANCISCO, CA – February 13, 2017 – RSA Conference 2017 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing envi...

Cloud Security Alliance Releases New Software Defined Perimeter for Infrastructure-as-a-Service Research

Article Published: 02/13/2017

New Report Outlines How SDP Can Be Applied to Infrastructure-as-a-Service Environments, Including Requirements, Benefits and Key Use Cases SAN FRANCISCO, CA – February 13, 2017 – RSA Conference 2017 - The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and r...

New Security Research – the Software-Defined Perimeter for the Cloud

Blog Published: 02/13/2017

By Jason Garbis, Vice President of Products, Cryptzone On behalf of the Cloud Security Alliance, I’m pleased to announce the publication of our newest security research from the Software Defined Perimeter (SDP) Working Group, exploring how the SDP can be applied to Infrastructure-as-a-Service en...

Cloud Security Alliance Announces General Availability of STARWatch Cloud Security Management Application

Press Release Published: 02/13/2017

Compliance Management SaaS Application Formally Launches Boasting More than 250 Active Users SAN FRANCISCO – February 13, 2017 – RSA Conference 2017 - The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure ...

Looking for the CCM?

Start using the Cloud Controls Matrix to simplify compliance with multiple standards & regulations.