3 Things Startups Need to Know to Move to the Cloud
Blog Published: 05/05/2015
By Shellye Archambeau, CEO, MetricStreamDespite concerns around data security, businesses are optimistic about the cloud. In fact, software-as-a-service adoption has more than quintupled from 13 percent in 2011 to 72 percent in 2014, according to a cloud computing survey conducted by North Bridge...
CSA to Hold Inaugural Federal Summit on May 5th in Washington DC
Blog Published: 05/04/2015
The CSA is excited to announce that it will be holding its inaugural Federal Summit 2015 on May 5th in Washington DC. The Cloud Security Alliance Federal Summit is a free for government event, comprised of information security professionals from civilian and defense agencies to share experiences ...
CLOUD SECURITY: HOW CAN GRC HELP?
Blog Published: 05/01/2015
By Vibhav Agarwal, Senior Manager of Product Marketing, MetricStreamAn integrated GRC approach to cloud acceptance, adoption and scale includes the risk perspective from the beginning. Harnessing the power of cloud security with a GRC framework can promote and improve information security practic...
White-Hat Malware
Blog Published: 04/29/2015
By Chris Hines, Product Marketing Manager, Bitglass As many of you know, we recently released the results of the first ever data tracking experiment in the Dark Web. In the “Where’s Your Data?“ experiment, we used our patent-pending watermarking technology to embed invisible trackers within a...
OPEN PEER REVIEW: Privacy Level Agreement 4 Europe V2
Press Release Published: 04/28/2015
The Cloud Security Alliance would like to invite you to review and comment on the Privacy Level Agreement 4 Europe V2. The Cloud Security Alliance published in February 2013 the “Privacy Level Agreement Outline for CSPs Providing Services in the European Union” (PLA4EU V.1). The PLA4EU V.1 should...
Banking on the Cloud: How to Enable File Sharing in Financial Services
Blog Published: 04/27/2015
By Chau Mai, Sr. Product Marketing Manager, Skyhigh NetworksAccording to Gartner, CISOs face a “double-edged sword” as they are tasked with combating the growth of shadow IT while enabling secure access to approved cloud services. Cloud file sharing and collaboration services can be an area of ri...
Compromised Accounts and Cloud Activity
Blog Published: 04/23/2015
By Krishna Narayanaswamy, Founder and Chief Scientist, NetskopeLast week, we released our Netskope Cloud Report for this quarter – global as well as Europe, Middle East and Africa versions.This report builds on our January Netskope Cloud Report in which we highlighted research on compromised user...
The Cloud Economy: 11 Essential Trends About How Companies Connect to Each Other Via the Cloud
Blog Published: 04/21/2015
By Kamal Shah, VP, Products and Marketing at Skyhigh NetworksThe cloud is having a measurable impact on business – IT departments are migrating to cloud services in order to take advantage of faster time-to-market, reduced operational costs, and reduced IT spending and maintenance costs. In addit...
(ISC)²® and Cloud Security Alliance Introduce New Cloud Security Certification
Press Release Published: 04/21/2015
Rapid growth and adoption of cloud services increase demand for cloud security expertise RSA Conference, San Francisco, CA, April 21, 2015 — (ISC)²® (“ISC-squared”) and the Cloud Security Alliance® (CSA) today announced the new Certified Cloud Security Professional (CCSP) certification. The CCSP...
Qualys CEO Philippe Courtot Receives the 2015 Industry Leadership Award from the Cloud Security Alliance
Press Release Published: 04/20/2015
Courtot Honored for His Industry Innovations and Support as a Founding Member of the Cloud Security Alliance SAN FRANCISCO, Calif. – RSA Conference USA 2015, Booth #N3421 - April 20, 2015 – The Cloud Security Alliance (CSA) has named Philippe Courtot, CEO of cloud security firm Qualys, Inc. (NAS...
CSA Launches New Security Guidance for Early Adopters of the IoT
Press Release Published: 04/20/2015
Cross-Industry Guidance Highlights Key Challenges and Recommended IoT Security Controls. These controls have been tailored to IoT-specific characteristics to allow early adopters to mitigate many of the risks associated with this new technology. San Francisco, CA – April 20, 2015 – The Cloud Sec...
CSA STAR Registry Surpasses 100 Entries; New CSA STAR Watch Tool Now in Open Beta
Press Release Published: 04/20/2015
Cloud Providers Globally Seek to Meet Security Baselines Established by CSA San Francisco, CA – April 20, 2015 – The Cloud Security Alliance (CSA) today announced significant momentum for the CSA Security, Trust and Assurance Registry (STAR) program. CSA STAR is the industry’s comprehensive clou...
The Cloud Guide to RSA
Blog Published: 04/10/2015
By Sam Bleiberg, Communications Associate, SkyHigh NetworksSan Francisco hosts more than its share of conferences and festivals, and residents know the best way to maximize your time at events is to go in with a plan. With that in mind, we created a Skyhigh guide to RSA. Planning your agenda from...
Hot Legal Issues in the Cloud to Take Center Stage at Cloud Security Alliance Legal Information Seminar at RSA Conference 2015
Press Release Published: 04/09/2015
Representatives from California Department of Justice, Federal Trade Commission, IT Law Group, and MUFG Union Bank to Emphasize "An Ounce of Preparation is Better than a Pound of Damage Control" San Francisco, CA (RSA Conference 2015) – April 8, 2015 – The Cloud Security Alliance (CSA) today an...
OPEN PEER REVIEW: Cloud Forensics Capability Maturity Model
Press Release Published: 04/09/2015
The Cloud Security Alliance would like to invite you to review and comment on the Cloud Forensics Capability Maturity Model. This document describes a process maturity model that can be used by both cloud consumers and cloud service provider’s (CSP’s) in assessing their process maturity in conduc...
Cloud Security Alliance to Host Third Software Defined Perimeter (SDP) Hackathon– Top Prize of $10,000 Available
Press Release Published: 04/07/2015
Participants Invited to Gain Access to Password Provided Account at RSA Conference; To Date No One Has Broken Alliance’s SDP Security Specification San Francisco, Calif. (RSA Conference Booth 2621) – April 7, 2015 - The Cloud Security Alliance (CSA), a not-for-profit organization which promotes ...
The Bitglass "Where's Your Data?" Experiment
Blog Published: 04/07/2015
By Chris Hines, Product Marketing Manager, Bitglass783. That's the total number of reported breaches involving stolen data that occured in 2014 alone.When the story first broke about the Morgan Stanley breach, where an ex-employee stole corporate data and pasted it on a file-sharing site called P...
Top 3 Reasons Enterprises Hesitate to Adopt the Cloud
Blog Published: 04/02/2015
By Stephanie Bailey, Senior Director/Product Marketing, PerspecsysDespite the clear benefits of the cloud, many enterprises still hesitate to fully adopt or capitalize on all the advantages. There are a few key reasons for hesitation, including the prevalence of data breaches and hacks in recent ...
CSA Working Group Sessions at RSA
Press Release Published: 04/01/2015
CSA would like to invite members and other security professionals in San Francisco for RSA to working group sessions from CSA’s Research Portfolio. On Tuesday 4/21 from 9am-5pm, CSA will host and share updates to the following working groups: Cloud Data Governance Internet of Things Cloud I...
Cloud Computing – It’s a Question of Trust
Blog Published: 03/27/2015
By Raj Samani, Vice President and CTO, McAfee EMEACan we really trust cloud computing? Or perhaps more importantly do you trust the cloud? And does the perceived lack of transparency, combined with recent negative headlines, impact future investments in cloud computing?In conjunction with the Clo...