Cloud 101CircleEventsBlog

All Articles

All Articles
3 Things Startups Need to Know to Move to the Cloud

Blog Published: 05/05/2015

By Shellye Archambeau, CEO, MetricStreamDespite concerns around data security, businesses are optimistic about the cloud. In fact, software-as-a-service adoption has more than quintupled from 13 percent in 2011 to 72 percent in 2014, according to a cloud computing survey conducted by North Bridge...

CSA to Hold Inaugural Federal Summit on May 5th in Washington DC

Blog Published: 05/04/2015

The CSA is excited to announce that it will be holding its inaugural Federal Summit 2015 on May 5th in Washington DC. The Cloud Security Alliance Federal Summit is a free for government event, comprised of information security professionals from civilian and defense agencies to share experiences ...

CLOUD SECURITY: HOW CAN GRC HELP?

Blog Published: 05/01/2015

By Vibhav Agarwal, Senior Manager of Product Marketing, MetricStreamAn integrated GRC approach to cloud acceptance, adoption and scale includes the risk perspective from the beginning. Harnessing the power of cloud security with a GRC framework can promote and improve information security practic...

White-Hat Malware

Blog Published: 04/29/2015

By Chris Hines, Product Marketing Manager, Bitglass As many of you know, we recently released the results of the first ever data tracking experiment in the Dark Web. In the “Where’s Your Data?“ experiment, we used our patent-pending watermarking technology to embed invisible trackers within a...

OPEN PEER REVIEW: Privacy Level Agreement 4 Europe V2

Press Release Published: 04/28/2015

The Cloud Security Alliance would like to invite you to review and comment on the Privacy Level Agreement 4 Europe V2. The Cloud Security Alliance published in February 2013 the “Privacy Level Agreement Outline for CSPs Providing Services in the European Union” (PLA4EU V.1). The PLA4EU V.1 should...

Banking on the Cloud: How to Enable File Sharing in Financial Services

Blog Published: 04/27/2015

By Chau Mai, Sr. Product Marketing Manager, Skyhigh NetworksAccording to Gartner, CISOs face a “double-edged sword” as they are tasked with combating the growth of shadow IT while enabling secure access to approved cloud services. Cloud file sharing and collaboration services can be an area of ri...

Compromised Accounts and Cloud Activity

Blog Published: 04/23/2015

By Krishna Narayanaswamy, Founder and Chief Scientist, NetskopeLast week, we released our Netskope Cloud Report for this quarter – global as well as Europe, Middle East and Africa versions.This report builds on our January Netskope Cloud Report in which we highlighted research on compromised user...

The Cloud Economy: 11 Essential Trends About How Companies Connect to Each Other Via the Cloud

Blog Published: 04/21/2015

By Kamal Shah, VP, Products and Marketing at Skyhigh NetworksThe cloud is having a measurable impact on business – IT departments are migrating to cloud services in order to take advantage of faster time-to-market, reduced operational costs, and reduced IT spending and maintenance costs. In addit...

(ISC)²® and Cloud Security Alliance Introduce New Cloud Security Certification

Press Release Published: 04/21/2015

Rapid growth and adoption of cloud services increase demand for cloud security expertise RSA Conference, San Francisco, CA, April 21, 2015 — (ISC)²® (“ISC-squared”) and the Cloud Security Alliance® (CSA) today announced the new Certified Cloud Security Professional (CCSP) certification. The CCSP...

Qualys CEO Philippe Courtot Receives the 2015 Industry Leadership Award from the Cloud Security Alliance

Press Release Published: 04/20/2015

Courtot Honored for His Industry Innovations and Support as a Founding Member of the Cloud Security Alliance SAN FRANCISCO, Calif. – RSA Conference USA 2015, Booth #N3421 - April 20, 2015 – The Cloud Security Alliance (CSA) has named Philippe Courtot, CEO of cloud security firm Qualys, Inc. (NAS...

CSA Launches New Security Guidance for Early Adopters of the IoT

Press Release Published: 04/20/2015

Cross-Industry Guidance Highlights Key Challenges and Recommended IoT Security Controls. These controls have been tailored to IoT-specific characteristics to allow early adopters to mitigate many of the risks associated with this new technology. San Francisco, CA – April 20, 2015 – The Cloud Sec...

CSA STAR Registry Surpasses 100 Entries; New CSA STAR Watch Tool Now in Open Beta

Press Release Published: 04/20/2015

Cloud Providers Globally Seek to Meet Security Baselines Established by CSA San Francisco, CA – April 20, 2015 – The Cloud Security Alliance (CSA) today announced significant momentum for the CSA Security, Trust and Assurance Registry (STAR) program. CSA STAR is the industry’s comprehensive clou...

The Cloud Guide to RSA

Blog Published: 04/10/2015

By Sam Bleiberg, Communications Associate, SkyHigh NetworksSan Francisco hosts more than its share of conferences and festivals, and residents know the best way to maximize your time at events is to go in with a plan. With that in mind, we created a Skyhigh guide to RSA. Planning your agenda from...

Hot Legal Issues in the Cloud to Take Center Stage at Cloud Security Alliance Legal Information Seminar at RSA Conference 2015

Press Release Published: 04/09/2015

Representatives from California Department of Justice, Federal Trade Commission, IT Law Group, and MUFG Union Bank to Emphasize "An Ounce of Preparation is Better than a Pound of Damage Control" San Francisco, CA (RSA Conference 2015) – April 8, 2015 – The Cloud Security Alliance (CSA) today an...

OPEN PEER REVIEW: Cloud Forensics Capability Maturity Model

Press Release Published: 04/09/2015

The Cloud Security Alliance would like to invite you to review and comment on the Cloud Forensics Capability Maturity Model. This document describes a process maturity model that can be used by both cloud consumers and cloud service provider’s (CSP’s) in assessing their process maturity in conduc...

Cloud Security Alliance to Host Third Software Defined Perimeter (SDP) Hackathon– Top Prize of $10,000 Available

Press Release Published: 04/07/2015

Participants Invited to Gain Access to Password Provided Account at RSA Conference; To Date No One Has Broken Alliance’s SDP Security Specification San Francisco, Calif. (RSA Conference Booth 2621) – April 7, 2015 - The Cloud Security Alliance (CSA), a not-for-profit organization which promotes ...

The Bitglass "Where's Your Data?" Experiment

Blog Published: 04/07/2015

By Chris Hines, Product Marketing Manager, Bitglass783. That's the total number of reported breaches involving stolen data that occured in 2014 alone.When the story first broke about the Morgan Stanley breach, where an ex-employee stole corporate data and pasted it on a file-sharing site called P...

Top 3 Reasons Enterprises Hesitate to Adopt the Cloud

Blog Published: 04/02/2015

By Stephanie Bailey, Senior Director/Product Marketing, PerspecsysDespite the clear benefits of the cloud, many enterprises still hesitate to fully adopt or capitalize on all the advantages. There are a few key reasons for hesitation, including the prevalence of data breaches and hacks in recent ...

CSA Working Group Sessions at RSA

Press Release Published: 04/01/2015

CSA would like to invite members and other security professionals in San Francisco for RSA to working group sessions from CSA’s Research Portfolio. On Tuesday 4/21 from 9am-5pm, CSA will host and share updates to the following working groups: Cloud Data Governance Internet of Things Cloud I...

Cloud Computing – It’s a Question of Trust

Blog Published: 03/27/2015

By Raj Samani, Vice President and CTO, McAfee EMEACan we really trust cloud computing? Or perhaps more importantly do you trust the cloud? And does the perceived lack of transparency, combined with recent negative headlines, impact future investments in cloud computing?In conjunction with the Clo...

Looking for the CCM?

Start using the Cloud Controls Matrix to simplify compliance with multiple standards & regulations.