Cloud 101CircleEventsBlog

All Articles

All Articles
Cloud Security Alliance Software Defined Perimeter Working Group Announces New SDP for IaaS Initiative

Press Release Published: 03/03/2016

New Initiative To Address How SDP Can Solve Security, Compliance and Administration Challenges for Infrastructure as a Service (IaaS) San Francisco, CA – March 2, 2016 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awareness of best practi...

Security Versus Privacy in Today’s Enterprise

Blog Published: 03/03/2016

By Rachel Holdgrafer, Business Content Strategist, Code42Whether enterprise security or personal data privacy should prevail in the enterprise is the debate of the century. With internal actors responsible for 43 percent of enterprise data loss and 62 percent of respondents to the2016 Cyber Defen...

Listen to “Locked down at RSAC Podcast Episode 6” featuring Jim Reavis, Co-founder and CEO, CSA

Press Release Published: 03/03/2016

Jim Reavis, CEO of the Cloud Security Alliance, provides a 2-minute update on the state of the industry and highlights of the day-long Cloud Security Summit held at RSA 2016. The current state of security in cloud computing is strong, but uneven. Many issues remain to be addressed, including as s...

The Software-Defined Perimeter and IaaS: A New Initiative

Blog Published: 03/02/2016

By Kurt Glazemakers, CTO, CryptzoneAs enterprises embrace infrastructure as a service (IaaS) platforms, shifting new development and production into these environments, they face some challenges due to the dynamic nature of IaaS. Security, compliance and business & IT efficiency – specificall...

SecaaS Working Group Releases Preview of Security as a Service Functional Domain Definitions – Including Continuous Monitoring

Blog Published: 02/29/2016

By John Yeoh, Senior Research Analyst, Global, Cloud Security AllianceNumerous security vendors are now leveraging cloud-based Security as a Service (SecaaS) models to deliver security solutions. This shift has occurred for a variety of reasons including greater economies of scale and streamlined...

Cloud Security Alliance Establishes Research Fellowship Program in Recognition of Extraordinary CSA Research Volunteer Accomplishments

Press Release Published: 02/29/2016

Applications for the inaugural Group of CSA Research Fellows Now Being Accepted. San Francisco, CA – February 29, 2016 – RSA Conference 2016 - The Cloud Security Alliance (CSA) today announced the establishment of the CSA Research Fellowship Program designation, the highest honor and distinction...

Amit Yoran Receives the 2016 Industry Leadership Award from the Cloud Security Alliance

Press Release Published: 02/29/2016

RSA President is honored for diverse accomplishments furthering the information security industrySAN FRANCISCO, Calif. – February 29, 2016 RSA Conference USA 2016 – The Cloud Security Alliance (CSA) has named RSA President Amit Yoran as the 2016 recipient of the CSA Industry Leadership Award. The...

Cloud Security Alliance Releases Candidate Mapping of ISO 27002/27017/27018 Security Controls

Press Release Published: 02/29/2016

At the Cloud Security Alliance Summit San Francisco 2016, the CSA announced the release of the Candidate Mappings of ISO 27002/27017/27018 to version 3.0.1 of the CSA Cloud Controls Matrix (CCM). The ISO 27XXX series provides an overview of information security management systems. ISO 27002 prov...

Cloud Security Alliance Releases ‘The Treacherous Twelve’ Cloud Computing Top Threats in 2016

Press Release Published: 02/29/2016

New Research Findings Identify Risks Related to the Shared, On-demand Nature of Cloud ComputingSAN FRANCISCO – February 29, 2016 – RSA Conference Booth #S2614 – The Cloud Security Alliance (CSA) Top Threats Working Group today released The Treacherous 12: Cloud Computing Top Threats in 2016, an i...

Cloud Security Alliance Forms Global Enterprise Advisory Board

Press Release Published: 02/29/2016

Members to Play an Important, Strategic Role to Help Anticipate Emerging Trends, Ensure the Security of the Cloud and Guide the Future for the World’s Leading Cloud Computing OrganizationSan Francisco, CA – February 29, 2016 – RSA Conference 2016 - The Cloud Security Alliance (CSA) today announce...

CSA’S Virtualization Working Group Publishes New Position Paper on Network Function Virtualization

Blog Published: 02/29/2016

With the broad adoption of virtualized infrastructure, many security teams are now struggling with how to best secure these vital assets from targeted attacks. And because almost anyone can now easily virtualize resources such as compute, storage, networking and applications, the velocity and imp...

CSA’s Consensus Assessments Initiative Releases Minor Update to Version 3.0.1

Blog Published: 02/29/2016

CSA’s Consensus Assessments Initiative Working Group has released an update to version 3.0.1 of the Consensus Assessments Initiative Questionnaire (CAIQ) that included minor updates and corrections.A tab was created in the spreadsheet titled “CAIQ Change Log” to capture the details of each update...

Cloud Data Security Services Just Got Easier to Build and Assess

Blog Published: 02/26/2016

By Alan Eng, Senior Manager/Product Marketing, VormetricIt is well documented that security is the leading concern hindering cloud adoption. However, it is not so clear cut how to build secure cloud services, or how to assess whether cloud services adhere to relevant security requirements. The Cl...

Quantum Technologies and Real World Information Security Challenges

Blog Published: 02/25/2016

By Bruno Huttner, Quantum Safe Product Manager, ID QuantiqueMost cyber security applications rely on a few cryptographic primitives, for both encryption and signature. These primitives are now known to be breakable by a Quantum Computer (QC), that is a computer operating according to the rules of...

Apple vs. FBI: The “Bad” Guys Always Get the “Good” Weapons

Blog Published: 02/24/2016

By Susan Richardson, Manager/Content Strategy, Code42It’s a powerful tool, created for good—until it falls into the wrong hands. Sounds like a classic James Bond plot, right? That’s how we see the battle surrounding government-mandated “backdoors” playing out—and why we side with Apple (and most ...

The Netskope Cloud Report: The Cloud Malware Fan-out

Blog Published: 02/23/2016

By Krishna Narayanaswamy, Co-founder and Chief Scientist, NetskopeToday we released our Cloud Report in which we highlight cloud security findings from October through December of 2015.This quarter we focus on an important finding from our research team. In scanning many hundreds of our customers...

Cloud Security Alliance Appoints Daniele Catteddu to CTO Post

Press Release Published: 02/23/2016

As Its First Ever CTO, Catteddu to Spearhead Organization’s Global Technology Strategy and Roadmap Throughout Key Lines of Business Seattle, WA – February 23, 2016 - The Cloud Security Alliance (CSA) today announced the appointment of Daniele Catteddu as its first ever Chief Technology Officer. ...

Top Ten Reasons You Need to Attend the CSA Summit @ RSA February 29th

Blog Published: 02/22/2016

Cloud Security Alliance’s 7th annual CSA Summit @ RSA will be our biggest yet, with educational sessions covering cloud security from every angle. This Monday event is free for any type of RSA Conference pass holder, so make your plans to attend. If you need any more enticement, below are the T...

Open Survey on Identity Security

Press Release Published: 02/19/2016

We have a new survey open on identity security! The goal of this survey is to address this concern of insufficient IAM and gain a better enterprise understanding and perception of security from both an end user and privileged user point of view. Time: Approximately 10 to 15 minutes You Could Win...

CloudBytes Webinar: CSA Top Threats

Press Release Published: 02/19/2016

CloudBytes Webinar: CSA Top Threats Learn more about the CSA Top Threats Report with HPE Security-Data Security The Borderless World: Bridging the Cloud with On-Prem Systems In the borderless world of Cloud computing, everything changes. You cannot deliver a cloud enabled business without a fu...

Looking for the CCM?

Start using the Cloud Controls Matrix to simplify compliance with multiple standards & regulations.