Cloud 101CircleEventsBlog
Master CSA’s Security, Trust, Assurance, and Risk program—download the STAR Prep Kit for essential tools to enhance your assurance!

All Articles

All Articles
Searching for Blockchain Co-Chair

Press Release Published: 02/27/2017

CSA is searching for another co-chair to help lead the Blockchain / Distributed Ledger working group who is preferably from the financial side. Being a co-chair of the work group presents great opportunities such as networking and interacting closely with volunteers representing some of the top m...

Is Your Industry at High Risk of Insider Threat?

Blog Published: 02/24/2017

By Jeremy Zoss, Managing Editor, Code42In the movies, data theft is usually the work of outsiders. You’ve witnessed the scene a million times: A cyber thief breaks into a business, avoiding security measures, dodging guards and employees, and making off with a USB stick of valuable data seconds b...

The Rise in SSL-based Threats

Blog Published: 02/23/2017

By Derek Gooley, Security Researcher, ZscalerOverviewThe majority of Internet traffic is now encrypted. With the advent of free SSL providers like Let’s Encrypt, the move to encryption has become easy and free. On any given day in the Zscaler cloud, more than half of the traffic that inspected us...

The Growth of Macs in the Enterprise Is Challenging the PC’s Dominance

Blog Published: 02/22/2017

By Jeremy Zoss, Managing Editor, Code42The PC has long been the default choice for business computers, but perhaps not for much longer. The growth of Macs in the enterprise has been exponential in recent years, as illustrated by the infographic below.For context on why Macs are growing in popular...

Avoid the Heartbreak of Insider Threat

Blog Published: 02/14/2017

By Ashley Jarosch, Manager/Marketing Programs, Code42While everyone else is celebrating love and romance this Valentine’s Day, here at Code42 we’re reflecting on heartbreak—specifically, the heartbreak of insider threat.The Heartbreak and Betrayal of Insider ThreatIt’s a feeling anyone in the ent...

The New CSA Consultancy Program Will Ensure Best Practices in Secure Cloud Implementation

Blog Published: 02/13/2017

By Daniele Catteddu, Chief Technology Officer, CSAAs increasing numbers of enterprises begin the move to the cloud in earnest, there has simultaneously developed a host of third-party consultancy firms, offering guidance on cloud technology best practices and implementation. Recognizing that ther...

Cloud Security Alliance Establishes New Third-Party Consultancy Program to Ensure Best Practices in Secure Cloud Implementation

Press Release Published: 02/13/2017

CSA Names Optiv As First Certified Provider for New Program SAN FRANCISCO, CA – February 13, 2017 – RSA Conference 2017 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing envi...

Cloud Security Alliance Releases New Software Defined Perimeter for Infrastructure-as-a-Service Research

Press Release Published: 02/13/2017

New Report Outlines How SDP Can Be Applied to Infrastructure-as-a-Service Environments, Including Requirements, Benefits and Key Use Cases SAN FRANCISCO, CA – February 13, 2017 – RSA Conference 2017 - The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and r...

New Security Research – the Software-Defined Perimeter for the Cloud

Blog Published: 02/13/2017

By Jason Garbis, Vice President of Products, CryptzoneOn behalf of the Cloud Security Alliance, I’m pleased to announce the publication of our newest security research from the Software Defined Perimeter (SDP) Working Group, exploring how the SDP can be applied to Infrastructure-as-a-Service envi...

Cloud Security Alliance Announces General Availability of STARWatch Cloud Security Management Application

Press Release Published: 02/13/2017

Compliance Management SaaS Application Formally Launches Boasting More than 250 Active Users SAN FRANCISCO – February 13, 2017 – RSA Conference 2017 - The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure ...

3-2-1, Takeoff. The STARWatch Cloud Security Management Application Has Launched

Blog Published: 02/13/2017

By Daniele Catteddu, Chief Technology Officer, Cloud Security AllianceCompliance, assurance and vendor management are becoming more and more complex and resource-intensive issues, so we created STARWatch, a Software as a Service (SaaS) application designed to provide organizations a centralized w...

On Data Privacy Day, Keep Your Data Safe by Identifying the Threats

Blog Published: 01/30/2017

By Rick Orloff, Chief Security Officer, Code42Saturday, January 28th was Data Privacy Day. We’re proud champions of the National Cyber Security Alliance’s focused effort on protecting privacy and safeguarding data. But at Code42, we know that one day isn’t enough. We dedicate an entire month each...

Reviewers Needed: Security Guidance for Critical Areas of Mobile Computing

Press Release Published: 01/25/2017

Dear Colleagues, The Mobile Working Group is updating the document entitled "Security Guidance for Critical Areas of Mobile Computing" last published in 2012. To streamline the updating process, we are opening a peer review of the 2012 document. We are looking for SMEs to provide feedback on the...

CSA’s Mobile Working Group Seeking New Co-Chair

Press Release Published: 01/25/2017

The Cloud Security Alliance’s Mobile Working Group is seeking new co-chairs to develop and maintain a research portfolio providing capabilities to lead the crystallization of best practices for mobile security, help industry and government on adoption of best practices, establish liaisons with ot...

CSA releases Quantum-Safe Security Glossary

Blog Published: 01/25/2017

The Cloud Security Alliance's Quantum-Safe Security (QSS) Working Group announces their latest release with the Quantum-Safe Security Glossary. The QSS Working Group was formed to address key generation and transmission methods and to help the industry understand quantum-safe methods for protecti...

STAR- A Window to the Cloud

Blog Published: 01/20/2017

By Raj Samani, Chief Technology Officer/EMEA, Intel SecurityWe are all going to live in the cloud. Well that is what every study, and forecast tells us. From our clash of clans villages, to our connected cars we can expect all of our data to be hosted in an unmarked data center in a town that we ...

People Are Not IP Addresses…So Why Do Security Solutions Think They Are?

Blog Published: 01/18/2017

By Jason Garbis, Vice President of Products, Cryptzone Attackers are erasing database contents and replacing them with a note demanding Bitcoin ransom payment for restoration. It also appears that victims who pay are often not getting their data back, and that multiple attackers are overwriting e...

Windows 10 Steps Up Ransomware Defense

Blog Published: 01/17/2017

By Jeremy Zoss, Managing Editor, Code42Here’s some good news for the countless businesses getting ready for the migration to Windows 10: Microsoft recently announced that its Windows 10 Anniversary Update features security updates specifically targeted to fight ransomware. No defense is completel...

Open Peer Review: Cloud Security Services Management Working Group Charter

Press Release Published: 01/13/2017

The Cloud Security Alliance would like to invite you to review and comment on the proposed Cloud Security Services Management Working Group Charter. It is well acknowledged that collaboration and coordination among all stakeholders are critical to secure the cloud platform, therefore there is a ...

Open Peer Review: Cloud Component Specifications Working Group Charter

Press Release Published: 01/13/2017

The Cloud Security Alliance would like to invite you to review and comment on a proposed Cloud Component Specifications Working Group Charter. The working group aims to look at security of Cloud computing at a component level - e.g. hypervisor, virtual desktop infrastructure (VDI) platforms, clou...

Looking for the CCM?

Start using the Cloud Controls Matrix to simplify compliance with multiple standards & regulations.