Cloud Security Alliance EMEA Congress 2019 to Host Career-Advancing Cloud Security and Privacy Training Opportunities
Press Release Published: 09/12/2019
Attendees can take advantage of top-ranked courses on CCSK Foundation, GDPR Lead Auditor, and Cloud Governance and Compliance Training Berlin, Germany – Sept. 12, 2019 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications and best pr...
Open API Survey Report
Blog Published: 09/11/2019
By the Open API CSA Working GroupCloud Security Alliance completed its first-ever Open API Survey Report, in an effort to see exactly where the industry stood on the knowledge surrounding Open APIs as well as how business professionals and consumers were utilizing them day to day. The key traits ...
Cloud Security Roadmap for 2019 & Beyond
Blog Published: 09/10/2019
By Amélie Darchicourt, Product Marketing Manager, ExtraHopHow to succeed under the shared responsibility modelCloud security is an evolving space where consumers and vendors must innovate quickly, not only to outpace attackers, but also to support rapid development while minimizing the risks pre...
CSA’s Certificate of Cloud Security Knowledge Exam Is Now Covered Under the U.S. Dept. of Veterans Affairs GI Bill®
Press Release Published: 09/10/2019
Eligible U.S. Veterans can now take advantage of opportunity to deepen their cloud security knowledge as part of GI Bill’s educational benefits SEATTLE – September 10, 2019 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awareness...
What Executives Should Know About the Capital One Breach
Blog Published: 09/09/2019
By Phillip Merrick, CEO of FugueMost enterprises are already using public cloud computing services at scale or are planning to adopt the cloud soon. As an executive, chances are you’re paying attention to the Capital One data breach and wondering how this event should impact your decision-making....
How to Share the Security Responsibility Between the CSP and Customer
Blog Published: 09/05/2019
By Dr. Kai Chen, Chief Security Technology Officer, Consumer BG, Huawei Technologies Co. Ltd. The behemoths of cloud service providers (CSPs) have released shared security responsibility related papers and articles, explaining their roles and responsibilities in cloud provisioning. Although they ...
Security Spotlight: iPhones Susceptible to a Hack via Text
Blog Published: 09/04/2019
By Juan Lugo, Product Marketing Manager at BitglassHere are the top stories of recent weeks: iPhones Susceptible to a Hack via TextDemocratic Senate campaign group exposed emails of 6.2 million AmericansState Farm says Hackers Successfully Conducted a Credentials Stuffing Attack96 Million Stream...
Cloud Security Alliance to Address Convergence of Privacy and Security at 2019 EMEA Congress
Press Release Published: 09/04/2019
Andreas Könen, Udo Helmbrecht, and Pearse O'Donohue join thought leaders from BSI, European Privacy Association, Adobe, and Google Cloud as speakers Berlin, Germany – Sept. 4, 2019 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certification...
Egregious 11 Meta-Analysis Part 2: Virtualizing Visibility
Blog Published: 08/28/2019
By Victor Chin, Research Analyst, CSAThis is the second blog post in the series where we analyze the security issues in the new iteration of the Top Threats to Cloud Computing report. Each blog post features a security issue that is being perceived as less relevant and one that is being perceived...
On-Chain vs Off-Chain governance. What are the rules to Calvinball?
Blog Published: 08/26/2019
By Kurt Seifried, Chief Blockchain Officer, CSAIf you don’t know what Calvin and Hobbes is you can skip the next bit, but it is amusing. Calvinball is a game invented by Calvin and Hobbes. Calvinball has no rules; the players make up their own rules as they go along, making it so that no Calvinba...
Egregious 11 Meta-Analysis Part 1: (In)sufficient Due Diligence and Cloud Security Architecture and Strategy
Blog Published: 08/13/2019
By Victor Chin, Research Analyst, CSA On August 6th, 2019, the CSA Top Threats working group released the third iteration of the Top Threats to Cloud Computing report. This is the first blog post in the series where we analyze the security issues in the new iteration of the Top Threats to Cloud C...
Cloud Security Alliance's D.C. Metro Area Chapter announces the event of the year: the Cybersecurity Cruise!
Blog Published: 08/12/2019
By: Anil Karmel, President, CSA-DC Chapter & Co-Founder and CEO of C2 Labs, Inc. About a year ago, CSA recognized the need to establish a local chapter serving the unique needs of the Washington D.C. Metro Area. It's been my honor and privilege to serve as the President of this new Chapter a...
CSA Releases “The Six Pillars of DevSecOps” Report
Press Release Published: 08/09/2019
Paper identifies areas critical to successful DevSecOps integration within an organization LAS VEGAS - AUGUST, 7, 2019 - BLACKHAT––The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications and best practices to help ensure a secure cloud c...
CSA Releases New Research - Top Threats to Cloud Computing: Egregious Eleven
Press Release Published: 08/09/2019
Research shows traditional security issues falling by the wayside while those stemming from senior management decisions of increasing concern LAS VEGAS – AUGUST 6, 2019 – BLACKHAT2019 - The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certificat...
A Technical Analysis of the Capital One Cloud Misconfiguration Breach
Blog Published: 08/09/2019
This article was originally published on Fugue's blog hereBy Josh Stella, Co-founder & Chief Technology Officer, FugueThis is a technical exploration of how the Capital One breach might have occurred, based on the evidence we have from the criminal complaint. I want to start by saying that I ...
Uncovering the CSA Top Threats to Cloud Computing with Jim Reavis
Blog Published: 08/08/2019
By Greg Jensen, Sr. Principal Director - Security Cloud Business Group, OracleFor the few that attend this year’s BlackHat conference kicking off this week in Las Vegas, many will walk away with an in depth understanding and knowledge on risk as well as actionable understandings on how they can w...
Challenges & Best Practices in Securing Application Containers and Microservices
Blog Published: 08/08/2019
By Anil Karmel, Co-Chair, CSA Application Containers and Microservices (ACM) Working GroupApplication Containers have a long and storied history, dating back to the early 1960s with virtualization on mainframes up to the 2000s with the release of Solaris and Linux Containers (LXC). The rise of Do...
The Cloud in the Fight Against Cyber-Bullying
Blog Published: 08/07/2019
By the Cybersecurity International Institute (CSI)Learn about the upcoming innovative social project on Cyber-bullying using a cloud platform.The CSI Institute (Cybersecurity International Institute) is a non-governmental and not-for-profit organization. Our goal is to contribute to the informati...
Facebook Project Libra - the good, the bad, the ugly and why you should care
Blog Published: 08/05/2019
By Kurt Seifried, Chief Blockchain Officer, CSASo you’ve probably heard by now that Facebook will be creating a crypto-currency called “Project Libra” and if you haven’t well, now you know.So first let’s cover what is good about this. Facebook has announced Project Libra as a Stablecoin, its valu...
CCM v3.0.1. Update for AICPA, NIST and FedRAMP Mappings
Blog Published: 08/02/2019
Victor Chin and Lefteris Skoutaris, Research Analysts, CSA The CSA Cloud Controls Matrix (CCM) Working Group is glad to announce the new update to the CCM v3.0.1. This minor update will incorporate the following mappings:Association of International Certified Professional Accountants (AICPA) Trus...