Help us improve our website. Provide feedback to [email protected]
 

CSA Article

Published 01/23/2016

Open Peer Review: The Treacherous 12 - Cloud Computing Top Threats in 2016

Open Peer Review: The Treacherous 12 - Cloud Computing Top Threats in 2016

The Cloud Security Alliance would like to invite you to review and comment on the Top Threats Working Group's survey report, The Treacherous 12 - Cloud Computing Top Threats in 2016. The survey report shares findings and analysis from the Top Threats Working Group's survey from late 2015. The revised report aimed to provide organizations with up-to-date, expert-informed understanding of cloud security threats in order to make educated risk-management decisions regarding cloud adoption strategies.

This is your opportunity to provide feedback and identify any critical areas that we might be missing in our working group’s focus. The open review and comments period starts today and ends on February 15, 2016. Submitting feedback is easy with our three-step process.

Contribute now

We appreciate your assistance, contribution, and time. Thank you in advance for your time and contribution. If you are interested in getting involved with the Top Threats working group, please contact [email protected].

Share this content on your favorite social network today!

About Cloud Security Alliance

The Cloud Security Alliance is a not-for-profit organization with a mission to promote the use of best practices for providing security assurance within Cloud Computing, and to provide education on the uses of Cloud Computing to help secure all other forms of computing. The Cloud Security Alliance is led by a broad coalition of industry practitioners, corporations, associations and other key stakeholders. For further information, follow us on Twitter @cloudsa.

For press inquiries, email Zenobia Godschalk of ZAG Communications or reach her by phone at 650.269.8315.