Cloud 101CircleEventsBlog
Master CSA’s Security, Trust, Assurance, and Risk program—download the STAR Prep Kit for essential tools to enhance your assurance!

All Articles

All Articles
Cloud Security Alliance Establishes Research Fellowship Program in Recognition of Extraordinary CSA Research Volunteer Accomplishments

Press Release Published: 02/29/2016

Applications for the inaugural Group of CSA Research Fellows Now Being Accepted. San Francisco, CA – February 29, 2016 – RSA Conference 2016 - The Cloud Security Alliance (CSA) today announced the establishment of the CSA Research Fellowship Program designation, the highest honor and distinction...

Amit Yoran Receives the 2016 Industry Leadership Award from the Cloud Security Alliance

Press Release Published: 02/29/2016

RSA President is honored for diverse accomplishments furthering the information security industrySAN FRANCISCO, Calif. – February 29, 2016 RSA Conference USA 2016 – The Cloud Security Alliance (CSA) has named RSA President Amit Yoran as the 2016 recipient of the CSA Industry Leadership Award. The...

Cloud Security Alliance Releases Candidate Mapping of ISO 27002/27017/27018 Security Controls

Press Release Published: 02/29/2016

At the Cloud Security Alliance Summit San Francisco 2016, the CSA announced the release of the Candidate Mappings of ISO 27002/27017/27018 to version 3.0.1 of the CSA Cloud Controls Matrix (CCM). The ISO 27XXX series provides an overview of information security management systems. ISO 27002 prov...

Cloud Security Alliance Releases ‘The Treacherous Twelve’ Cloud Computing Top Threats in 2016

Press Release Published: 02/29/2016

New Research Findings Identify Risks Related to the Shared, On-demand Nature of Cloud ComputingSAN FRANCISCO – February 29, 2016 – RSA Conference Booth #S2614 – The Cloud Security Alliance (CSA) Top Threats Working Group today released The Treacherous 12: Cloud Computing Top Threats in 2016, an i...

Cloud Security Alliance Forms Global Enterprise Advisory Board

Press Release Published: 02/29/2016

Members to Play an Important, Strategic Role to Help Anticipate Emerging Trends, Ensure the Security of the Cloud and Guide the Future for the World’s Leading Cloud Computing OrganizationSan Francisco, CA – February 29, 2016 – RSA Conference 2016 - The Cloud Security Alliance (CSA) today announce...

CSA’S Virtualization Working Group Publishes New Position Paper on Network Function Virtualization

Blog Published: 02/29/2016

With the broad adoption of virtualized infrastructure, many security teams are now struggling with how to best secure these vital assets from targeted attacks. And because almost anyone can now easily virtualize resources such as compute, storage, networking and applications, the velocity and imp...

CSA’s Consensus Assessments Initiative Releases Minor Update to Version 3.0.1

Blog Published: 02/29/2016

CSA’s Consensus Assessments Initiative Working Group has released an update to version 3.0.1 of the Consensus Assessments Initiative Questionnaire (CAIQ) that included minor updates and corrections.A tab was created in the spreadsheet titled “CAIQ Change Log” to capture the details of each update...

Cloud Data Security Services Just Got Easier to Build and Assess

Blog Published: 02/26/2016

By Alan Eng, Senior Manager/Product Marketing, VormetricIt is well documented that security is the leading concern hindering cloud adoption. However, it is not so clear cut how to build secure cloud services, or how to assess whether cloud services adhere to relevant security requirements. The Cl...

Quantum Technologies and Real World Information Security Challenges

Blog Published: 02/25/2016

By Bruno Huttner, Quantum Safe Product Manager, ID QuantiqueMost cyber security applications rely on a few cryptographic primitives, for both encryption and signature. These primitives are now known to be breakable by a Quantum Computer (QC), that is a computer operating according to the rules of...

Apple vs. FBI: The “Bad” Guys Always Get the “Good” Weapons

Blog Published: 02/24/2016

By Susan Richardson, Manager/Content Strategy, Code42It’s a powerful tool, created for good—until it falls into the wrong hands. Sounds like a classic James Bond plot, right? That’s how we see the battle surrounding government-mandated “backdoors” playing out—and why we side with Apple (and most ...

The Netskope Cloud Report: The Cloud Malware Fan-out

Blog Published: 02/23/2016

By Krishna Narayanaswamy, Co-founder and Chief Scientist, NetskopeToday we released our Cloud Report in which we highlight cloud security findings from October through December of 2015.This quarter we focus on an important finding from our research team. In scanning many hundreds of our customers...

Cloud Security Alliance Appoints Daniele Catteddu to CTO Post

Press Release Published: 02/23/2016

As Its First Ever CTO, Catteddu to Spearhead Organization’s Global Technology Strategy and Roadmap Throughout Key Lines of Business Seattle, WA – February 23, 2016 - The Cloud Security Alliance (CSA) today announced the appointment of Daniele Catteddu as its first ever Chief Technology Officer. ...

Top Ten Reasons You Need to Attend the CSA Summit @ RSA February 29th

Blog Published: 02/22/2016

Cloud Security Alliance’s 7th annual CSA Summit @ RSA will be our biggest yet, with educational sessions covering cloud security from every angle. This Monday event is free for any type of RSA Conference pass holder, so make your plans to attend. If you need any more enticement, below are the T...

Open Survey on Identity Security

Press Release Published: 02/19/2016

We have a new survey open on identity security! The goal of this survey is to address this concern of insufficient IAM and gain a better enterprise understanding and perception of security from both an end user and privileged user point of view. Time: Approximately 10 to 15 minutes You Could Win...

CloudBytes Webinar: CSA Top Threats

Press Release Published: 02/19/2016

CloudBytes Webinar: CSA Top Threats Learn more about the CSA Top Threats Report with HPE Security-Data Security The Borderless World: Bridging the Cloud with On-Prem Systems In the borderless world of Cloud computing, everything changes. You cannot deliver a cloud enabled business without a fu...

Something’s Gotta Give, And It’s You

Blog Published: 02/17/2016

By David Payne, VP Systems Engineering, Code42IT has lost the ability to unilaterally command which software employees access and what devices they carry. Anybody with a credit card can get the tools he or she needs to work fast and unencumbered. This freedom has significant impact on data securi...

Cloud Security Alliance APAC Summit 2016 Set to Open for CloudAsia

Press Release Published: 02/12/2016

Cloud Security Alliance and Infocomm Development Authority (IDA) partners to deliver international perspective at CloudAsia SINGAPORE – February 12, 2016 - Cloud Security Alliance Asia Pacific (CSA APAC) is proud to announce that this year’s CSA APAC Summit will be the curtain opener for Infocom...

Tentative Safe Harbour Agreement Reached—For Now

Blog Published: 02/12/2016

By Rachel Holdgrafer, Business Content Strategist, Code42The European Union and the United States have reached a preliminary agreement that would allow companies doing business on both sides of the Atlantic to resume transmitting individuals’ digital data.Struck down in October 2015 for failing t...

Can Wanted Cybercriminals Be Stopped?

Blog Published: 02/11/2016

By Leo Taddeo, ‎Chief Security Officer, CryptzonePart 2 of a 2-part seriesI recently wrote about the challenges around cybercrime reporting in the US. Organizations often fail to notify law enforcement after discovering a network intrusion – partly because of a reluctance on their part to admit ...

Five Surprising Truths from the Cloud Security Alliance’s Latest Survey

Blog Published: 02/08/2016

Survey of 200 it leaders finds that cloud perceptions, it security reporting structures, and cloud security approaches are changingBy Cameron Coles, Senior Product Marketing Manager, Skyhigh NetworksAfter years of IT leaders loudly voicing their concerns about the security of the cloud, trust in ...

Looking for the CCM?

Start using the Cloud Controls Matrix to simplify compliance with multiple standards & regulations.