Cloud 101CircleEventsBlog
Call for Presentations: Share your expertise at SECtember.ai 2024! Submit your proposals by June 28th.

All Articles

All Articles
CSA Announces Open Security Framework for Cloud Providers

Press Release Published: 08/20/2012

Edinburgh (UK) – August 20, 2012 –The Cloud Security Alliance (CSA) today announces additional details of its Open Certification Framework, and its partnership with BSI (British Standards Institution). This partnership will ensure the Open Certification Framework is in line with international sta...

Avoiding Storms In The Cloud – The Critical Need for Independent Verification

Blog Published: 08/16/2012

By Chris Wysopal, Co-founder and CTO of VeracodeLast year, Forrester predicted that cloud computing would top $240 billion in 2020. Market Research Media came up with a more aggressive forecast of $270 billion in 2020. None of this data is particularly surprising, as cloud technology is clearly...

Big Data, Big Cloud, Big Problem

Blog Published: 08/15/2012

By Todd ThiemannBig data presents a big opportunity for businesses to mine large volumes of data from a variety of sources to make better and more high velocity decisions. Since big data implementations are practically always deployed in a cloud environment, be it a private cloud or public cloud...

CSA, EBD and IDA to Ratify Singapore APAC Headquarters at CloudSec 2012 Conference

Press Release Published: 08/14/2012

Establishment of CSA Corporate Headquarters and Partnership with Leading Singaporean Agencies to Further Cloud Security in Asia Pacific Singapore – August 15, 2012 – Further to the announcement made on July 20 that Singapore was selected as site for corporate headquarters, the Cloud Security All...

Best Practices to Secure the Cloud with Identity Management

Blog Published: 08/13/2012

Authored by: Dan Dagnall, Director of Pre-Sales Engineering at Fischer International Identity   What is the “cloud identity?”   The “cloud identity” begins at the birth of the user’s “digital identity” and includes the attributes to define “who you are.”  “Cloud Identity” is...

Application-Aware Firewalls

Blog Published: 08/09/2012

You may have heard the term "application-aware firewalls" recently and wondered what it meant. When it comes to security, everyone thinks of Firewalls, Proxies, IPS, IDS, Honeypots, VPN devices, email security and even Web security, but most people don’t think in terms of application level securi...

Tempest in Cloud Computing Market: Will EU Article 29 Working Party’s Opinion Force a Rethink of the Safe Harbor Principles?

Press Release Published: 08/08/2012

The following article excerpt on “Tempest in Cloud Computing Market: Will EU Article 29 Working Party’s Opinion Force a Rethink of the Safe Harbor Principles?” was written by the external legal counsel of the CSA, Ms. Francoise Gilbert of the IT Law Group. We repost it here with her permission. P...

Helix Nebula Science Cloud Passes First Major Test

Press Release Published: 08/07/2012

Proof of concept results demonstrate that CERN, EMBL and ESA have succeeded in deploying challenging scientific applications on Helix-Nebula cloud August 7, 2012 –"Helix Nebula – the science cloud,” set up earlier this year to support the massive IT requirements of European scientists has succes...

PhD studentship in Cloud Service Security (Software Engineering Group)

Press Release Published: 08/07/2012

The Software Engineering Group within the School of Informatics of the City University London invites applications for a PhD studentship funded by the Cloud Security Alliance (CSA EMEA), connecting PhD students with industry partners from CSA's corporate members, to enhance research deployability...

CSA Seeks Input on SecaaS Categories of Service Implementation Guidance Documents

Press Release Published: 08/07/2012

As we did with the first wave of SecaaS peer reviews, the CSA Security as a Service (SecaaS) Working Group has expanded upon their "Defined Categories of Service" document released last year. Implementation Guidance documents, for each category of service previously defined, are being developed ...

CSA Seeks Input on CCM v1.3 FedRAMP Mapping Document

Press Release Published: 08/06/2012

The Cloud Security Alliance (CSA) Cloud Controls Matrix (CCM) Working Group (WG) would like to invite you to review and comment on a preliminary draft of CCM v1.3 with a revised mapping of the Federal Risk and Authorization Management Program (FedRAMP) security controls published January 2012. Th...

Consumerization 101 – Employee Privacy vs. Corporate Liability

Blog Published: 07/31/2012

Mary D. joined MD&M Inc. in 2009. Being an Apple enthusiast, she was quite excited to learn that the company offered an innovative BYOD program that allows employees to use their own iPhone for work. As part of the new hire package, Mary signed the acceptable use policy and was granted access...

Take the Top Threats to Cloud Computing Survey

Press Release Published: 07/24/2012

The Cloud Security Alliance (CSA) requests your input to update the Top Threats to Cloud Computing. This survey's purpose is to identify whether the Top Threats first identified by the CSA are still relevant today. The short survey can be taken here: https://www.surveymonkey.com/s/TopThreats Resu...

Cloud Security Alliance Selects Singapore as Site for Corporate Headquarters, Continues APAC Expansion Initiative

Press Release Published: 07/20/2012

CSA and Singapore Government Undertake Long-Term Public-Private Partnership to Further The Security of Cloud Computing Singapore – July 20, 2012 – The Cloud Security Alliance (CSA) today announced the establishment of the new CSA corporate headquarters in Singapore, under an effort led by the In...

Security Considerations When Evaluating Google Apps Marketplace Applications

Blog Published: 07/19/2012

By: Tsahy Shapsa, VP of Sales & Marketing and Co-Founder, CloudLockCustomers care about the security of their data in the cloud, and security of customer data is obviously important to Google, which is why Google has invested in completing numerous security audits and certifications such as F...

Some Things To Consider When Extending Your IdM Into The Cloud

Blog Published: 07/19/2012

About AuthorMark O’Neill is CTO of Vordel, a company which enables companies to connect to mobile and cloudLike many organizations, you no doubt face the challenge of extending your IT operations into the cloud to take advantage of the many cloud-based services demanded by your users today. As yo...

CSA Research Sponsorship Opportunities Available

Press Release Published: 07/18/2012

Cloud Security Alliances announces the availability of several new opportunities to sponsor key research initiatives. Your support helps us maintain our aggressive research schedule and accelerate responsible adoption of cloud computing. These projects provide excellent marketing benefits for spo...

Article 29 Working Party cloud computing opinion: Blow to Safe Harbor?

Press Release Published: 07/16/2012

The following blog excerpt on “Article 29 Working Party cloud computing opinion: Blow to Safe Harbor?” was written by the external legal counsel of the CSA, Ms. Francoise Gilbert of the IT Law Group. We repost it here with her permission. It can be viewed in its original form at: http://searchclo...

Take the CSA Top Threats to Mobile Computing Survey

Press Release Published: 07/11/2012

The Cloud Security Alliance's Mobile Working Group requests your participation in the inaugural "Top Threats to Mobile Computing" survey. Due to the rapid adoption of mobile computing, and immediate connection to cloud computing, the CSA is creating a “Top Threats to Mobile Computing” in addition...

Cloud Security Best Practices: Sharing Lessons Learned

Blog Published: 07/10/2012

By Frank Simorjay, Sr. Product Marketing Manager, Microsoft Trustworthy ComputingCompliance regulations and frameworks can be difficult to comprehend and even harder to explain to management when it’s time to invest in mastering IT governance. TheCloud Security Alliance (CSA) has taken steps to h...

Looking for the CCM?

Start using the Cloud Controls Matrix to simplify compliance with multiple standards & regulations.