Press Releases

Press Releases

Cloud Forensics Capability Maturity Model available for Download

Published: 10/13/2015

The Incident Management and Forensics Working Group today released its “Cloud Forensics Capability Maturity Model”, a new research report that describes a Capability Maturity Model (CMM) that can be used by both cloud consumers and Cloud Service Providers (CSPs) in assessing their process maturit...


Survey for the CSA Top Threats to Cloud Computing 2015 report is Open

Published: 10/09/2015

The Cloud Security Alliance Top Threats Working Group is conducting a survey of global security concerns in cloud computing. This short survey asks you to rate the relevance of 13 shortlisted security concerns in cloud computing. In addition, you will be given an opportunity to comment on and pro...


What Is Post-Quantum Cryptography?

Published: 10/06/2015

Post-quantum cryptography refers to the different classes of new cryptographic algorithms that are currently believed to resist quantum computer attacks. The most pressing issue today is these cryptographic algorithms need to be proactively in place several years before quantum computers are ava...


Cloud Security Alliance Releases New Guidance for Identity and Access Management for the Internet of Things

Published: 09/30/2015

Internet of Things (IOT) Working Group Provides Easily Understandable Recommendations for Securely Implementing and Deploying IoT Solutions Las Vegas, NV – CSA Congress 2016 -- Sept 30, 2015 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising a...


Cloud Security Alliance Announces Annual Ron Knode Service Award Recipients

Published: 09/30/2015

Contributions from Six Dedicated Individual CSA Volunteers Recognized in Honor of the Late CSA Member and Volunteer Contributor Ron Knode LAS VEGAS, NV – CSA CONGRESS 2015 - September 30, 2015 – The Cloud Security Alliance (CSA) today announced the recipients of its fourth annual Ron Knode Servi...


How Uber Uses the Cloud to Drive a Mobile Workforce

Published: 09/16/2015

Oceans of ink have already been spilled extolling Uber’s innovative practices and growing profits, but here’s one aspect getting less attention: How the company’s nearly 100 percent cloud-based business empowers its vast network of mobile workers (the drivers)... Read blog post


What’s Hindering the Adoption of Cloud Computing in Europe?

Published: 09/15/2015

As with their counterparts in North America, organizations across Europe are eagerly embracing cloud computing into their operating environment. However, despite the overall enthusiasm around the potential of cloud computing to transform their business practices, many CIOs have real concerns abou...


What is Quantum Key Distribution?

Published: 08/11/2015

“What is Quantum Key Distribution” addresses the issues around sharing and securing encryption keys in a quantum world. The position paper provides an overview of key distribution in general, examines some of current approaches and existing challenges of key distribution, and provides a brief ove...


IT and the Line of Business – Security vs Usability Survey

Published: 07/31/2015

The undeniable benefits of the cloud – better functionality, scalability, availability, and innovation at lower cost – is driving a secular move to cloud services. These benefits have made the cloud an executive-level and board-level conversation at many companies. As a result, IT is looking to t...


Cloud Security Alliance EMEA to Host Fourth Annual Congress

Published: 07/28/2015

Agenda and Keynote Speakers Announced for Premiere European Cloud Security Event Berlin, Germany – July 28, 2015 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment...


Cloud Security Alliance Unveils Project STRATUS Research Results

Published: 07/15/2015

CSA together with elite team of researchers and practitioners demonstrate prototype tool that automates the auditing process of cloud data governance Hamilton, New Zealand, July 15, 2015 – Cloud Security Alliance® (CSA) participated in the third quarterly meeting of the STRATUS project, a six-ye...


93 Percent of Cloud Services in Healthcare Are Medium to High Risk

Published: 07/10/2015

Unlike surveys that ask people to self report their behavior, our report is the first data-driven analysis of how healthcare organizations are embracing cloud services to reduce IT cost, increase productivity, and improve patient outcomes. Read blog post


Cloud Security Open API: The Future of Cloud Security

Published: 06/29/2015

The Cloud Security Alliance launched the Cloud Security Open API Working Group with the goal to provide guidance for enterprises and cloud service providers on the operation and interoperability of cloud security functions, with a specific goal to protect PII and sensitive data across multiple cl...


CipherCloud and Cloud Security Alliance Forge Cloud Security Working Group

Published: 06/29/2015

Cloud Security Open API Working Group to standardize key data security best practices for CASB deployments San Jose, Calif., June 29, 2015 – Recognized as the fastest-growing segment of cloud security, the cloud access security broker (CASB) space is still an emerging one where standards have ye...


The Cloud Security Alliance (CSA) has opened the call for papers for the 2015 CSA APAC Congress

Published: 06/18/2015

The 2015 CSA APAC Congress will be held December 1st-3rd in Guangzhou, China CSA APAC Congress is the premium event for compelling presentations and interesting discussions about research, development, practice and trends related to cloud security. Attendees represent end-user, research and indu...


Cloud Security Alliance Expands Star Provider Certification Into China

Published: 06/14/2015

Called CSA C-STAR Assessment, program brings increased security assurance to cloud service providers in the Greater China area based upon CSA global best practices; adoption already underway Guangzhou, CHINA, June 15, 2015 – The Cloud Security Alliance® (CSA) today announced the launch of CSA C-...


Call for Volunteers: Security Guidance for Critical Areas of Focus in Cloud Computing

Published: 06/08/2015

The Cloud Security Alliance’s (CSA) Security Guidance for Critical Areas of Focus leverages the CSA Cloud Control Matrix and seeks to establish a stable, secure baseline for cloud operations. It acts as a practical, actionable road map to individuals looking to safely and securely adopt the cloud...


CSA Establishes Cloud Data Governance Working Group and Releases Governance Framework

Published: 06/04/2015

The Cloud Data Governance working group has been created to design a universal set of principles and map to emerging technologies and techniques for ensuring the privacy, confidentiality, availability, integrity and security of data across private and public clouds. Read blog post


Cloud Security Alliance Releases New Privacy Level Agreement Guidelines to Address Personal Data Protection Compliance

Published: 06/03/2015

Powerful Self-regulatory Tool to Help Cloud Customers Better Understand and Evaluate Cloud Service Providers European Union Wide LONDON - Infosecurity Europe – June 3, 2015 - The Cloud Security Alliance (CSA) Privacy Level Agreement (PLA) Working Group today released the Privacy Level Agreement (...


What is Quantum-Safe Security?

Published: 05/28/2015

The Quantum-Safe Security working group released a position paper titled ‘What is Quantum-Safe Security?’ The document examines the need for a proactive defense against a multi-purpose quantum computer. Read blog post