Cloud 101CircleEventsBlog
Master CSA’s Security, Trust, Assurance, and Risk program—download the STAR Prep Kit for essential tools to enhance your assurance!

All Articles

All Articles
AWS Cloud: Proactive Security and Forensic Readiness – Part 5

Blog Published: 05/02/2019

By Neha Thethi, Information Security Analyst, BH Consulting Part 5: Incident Response in AWS In the event your organization suffers a data breach or a security incident, it’s crucial to be prepared and conduct timely investigations. Preparation involves having a plan or playbook at hand, along ...

CSA on This Millennium Alliance Podcast

Blog Published: 04/26/2019

By Cara Bernstein, Manager/Executive Education Partnerships, The Millennium AllianceThis podcast episode features The Millennium Alliance partner, The Cloud Security Alliance. We sat down with Vince Campitelli, Enterprise Security Specialist, and Jon-Michael C. Brook, Principal, Guide Holdings, L...

Cloud Security Alliance Announces Federal Summit 2019 Speaker Line-up

Press Release Published: 04/23/2019

Former U.S. CIO Vivek Kundra to share his experience leading change across the U.S. government, the world’s largest consumer of information technology Seattle, WA – April 23, 2019 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awareness of...

The Many Benefits of a Cloud Access Security Broker

Blog Published: 04/19/2019

By Will Houcheime, Product Marketing Manager, BitglassToday, organizations are finding that storing and processing their data in the cloud brings countless benefits. However, without the right tools (such as cloud access security brokers (CASBs), they can put themselves at risk. Organizations’ IT...

CCSK Success Stories: From a Data Privacy Consultant

Blog Published: 04/16/2019

By the CSA Education Team This is the fourth part in a blog series on cloud security training, in which we will be interviewing Satishkumar Tadapalli a certified and seasoned information security and data privacy consultant. Tadapalli has 12+ years of multi-functional IT experience in pre-sales,...

Prying Eyes Inside the Enterprise: Bitglass' Insider Threat Report

Blog Published: 04/12/2019

By Jacob Serpa, Product Marketing Manager, BitglassWhen words like cyberattack are used, they typically conjure up images of malicious, external threats. While hackers, malware, and other outside entities pose a risk to enterprise security, they are not the only threats that need to be remediated...

CSA STAR – The Answer to Less Complexity and Higher Level of Compliance

Blog Published: 03/28/2019

By John DiMaria, Assurance Investigatory Fellow, Cloud Security AllianceCSA STAR enables a higher level of compliance, data governance, reduced risk and more cost-effective management of your security and privacy systemWe just launched a major refresh of the CSA STAR (Security, Trust and Assuranc...

Healthcare Breaches and the Rise of Hacking and IT Incidents

Blog Published: 03/27/2019

By Jacob Serpa, Product Marketing Manager, BitglassIn the course of their day-to-day operations, healthcare organizations handle an extensive amount of highly sensitive data. From Social Security numbers to medical record numbers and beyond, it is imperative that these personal details are proper...

12 Ways Cloud Upended IT Security (And What You Can Do About It)

Blog Published: 03/25/2019

This article was originally published on Fugue's blog here.By Andrew Wright, Co-founder & Vice President of Communications, FugueThe cloud represents the most disruptive trend in enterprise IT over the past decade, and security teams have not escaped turmoil during the transition. It’s unders...

Better Vulnerability Management: How to Master Container Security in Three Steps

Blog Published: 03/21/2019

By Nate Dyer, Product Marketing Director, TenableApplication containers like Docker have exploded in popularity among IT and development teams across the world. Since its inception in 2013, Docker software has been downloaded 80 billion times and more than 3.5 million applications have been “dock...

Continuous Auditing - STAR Continuous - Increasing Trust and Integrity

Blog Published: 03/19/2019

By John DiMaria, Assurance Investigatory Fellow, Cloud Security AllianceAs a SixSigma Black Belt I was brought up over the years with the philosophy of continual monitoring and improvement, moving from a reactive state to a preventive state. Actually, I wrote a white paper a couple of years ago o...

Are Cryptographic Keys Safe in the Cloud?

Blog Published: 03/18/2019

By Istvan Lam, CEO, TresoritBy migrating data to the cloud, businesses can enjoy scalability, ease of use, enhanced collaboration and mobility, together with significant cost savings. The cloud can be especially appealing to subject-matter experts as they no longer have to invest in building and...

Webinar: The Ever Changing Paradigm of Trust in the Cloud

Blog Published: 03/12/2019

By CSA StaffThe CSA closed its 10th annual Summit at RSA on Monday, and the consensus was that the cloud has come to dominate the technology landscape and revolutionize the market, creating a tectonic shift in accepted practice. The advent of the cloud has been a huge advancement in technology. T...

CSA Summit Recap Part 2: CSP & CISO Perspective

Blog Published: 03/12/2019

By Elisa Morrison, Marketing Intern, Cloud Security AllianceWhen CSA was started in 2009, Uber was just a German word for 'Super' and all CSA stood for was Community Supported Agriculture. Now in 2019, spending on cloud infrastructure has finally exceeded on-premises, and CSA is celebrating its 1...

CSA Summit Recap Part 1: Enterprise Perspective

Blog Published: 03/08/2019

By Elisa Morrison, Marketing Intern, Cloud Security AllianceCSA’s 10th anniversary, coupled with the bestowal of the Decade of Excellence Awards gave a sense of accomplishment to this Summit that bodes well yet also challenges the CSA community to continue its pursuit of excellence. The common th...

CCSK Success Stories: From an Information Systems Security Manager

Blog Published: 03/07/2019

By the CSA Education TeamThis is the third part in a blog series on Cloud Security Training. Today, we will be interviewing Paul McAleer. Paul is a Marine Corps veteran and currently works as an Information Systems Security Manager (ISSM) at Novetta Solutions, an advanced data analytics company h...

A Decade of Vision

Blog Published: 03/05/2019

By Jim Reavis, Co-founder and CEO, Cloud Security Alliance Developing a successful and sustainable organization is dependent upon a lot of factors: quality services, a market vision, focus, execution, timing and maybe a little luck. For Cloud Security Alliance, now celebrating our 10th&nb...

Education: A Cloud Security Investigation (CSI)

Blog Published: 03/05/2019

By Will Houcheime, Product Marketing Manager, BitglassCloud computing is now widely used in higher education. It has become an indispensable tool for both the institutions themselves and their students. This is mainly because cloud applications, such as such as G Suite and Microsoft Office 365, c...

Cloud Security Alliance Debuts Internet of Things (IoT) 
Controls Framework and Accompanying Guide

Press Release Published: 03/05/2019

Framework introduces base-level security controls required to mitigate numerous risks associated with IoT systems SAN FRANCISCO – March 4, 2019 – RSA CONFERENCE 2019– The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awareness of best practices...

Cloud Security Alliance Announces Decade of Vision Leadership Award Winners

Press Release Published: 03/04/2019

Winners have provided consistent support, mentoring and evangelism of CSA over last decadeSAN FRANCISCO – March 4,2019 – RSA CONFERENCE 2019 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure ...

Looking for the CCM?

Start using the Cloud Controls Matrix to simplify compliance with multiple standards & regulations.