Cloud 101CircleEventsBlog

All Articles

All Articles
Call for Volunteers to Upgrade the CSA Cloud Controls Matrix to v1.2

Press Release Published: 06/22/2011

We need smart, motivated volunteers and team leaders who are committed to an early August 2011 completion date. You can prepare yourself by checking out the current CSA Cloud Controls Matrix (v1.1) here: https://cloudsecurityalliance.org/research/projects/cloud-controls-matrix-ccm/ If you want to...

Telecom Working Group Charter Finalized

Press Release Published: 06/21/2011

**June 21, 2011 ** – The Cloud Security Alliance (CSA) would like to announce that a finalized Telecom Working Group (TWG) Charter is available to download on the Telecom Working Group page. The working group's web page has also been updated to include current leadership and contributing members....

SecaaS Seeks Additional Input on Working Group Proposal

Press Release Published: 06/21/2011

**June 21, 2011 ** – Thank you to those who have contributed to the "Categories of Service" section of our working group proposal. We are still seeking input to all categories. For those who have recently expressed interest in getting involved, send me an email at [email protected]...

How Public Cloud Providers Can Improve Their Trustworthiness

Blog Published: 06/16/2011

By Matthew GardinerWhen you meet someone you have never met for the first time, in a place you have never been to, do you trust him? Would you have him hold your wallet for you or would you share some sensitive personal information with him? Of course not. Obviously this person is not trusted b...

SecaaS Seeks Input on Working Group Proposal

Press Release Published: 06/07/2011

June 6, 2011– The Cloud Security Alliance is now soliciting input for the Security as a Service (SecaaS) Working Group’s “Categories of Service” section of their working group proposal. One of the group’s objectives is to define categories of cloud security services (and to what degree they mitig...

Updated Telecom Working Group Charter Available for Review

Press Release Published: 05/26/2011

May 26, 2011 – The Cloud Security Alliance would like to announce that a draft of the updated Telecom Working Group (TWG) Charter is now available for review. The new charter re-defines the scope of the TWG to allow more differentiation and synergy with the Security as a Service (SecaaS – Work Gr...

Call for volunteers to upgrade the CSA Cloud Controls Matrix to v1.2

Press Release Published: 05/23/2011

In less than one month we will begin creating the next version of the CSA Controls Matrix. Our goals are to (1) include more granular controls for IaaS, and (2) create more mappings between the matrix and other compliance frameworks, such as NERC CIP. We need smart, motivated volunteers and team...

Cloud Security Alliance Launches New Greater China Regional Coordinating Body

Press Release Published: 05/20/2011

Beijing, China –China Cloud Computing General Conference– May 20, 2011 – Today at the China Cloud Computing General Conference, the Cloud Security Alliance (CSA) announced the formation of a new Greater China Regional Coordinating Body, to facilitate the growing interest in best practices for clo...

Pamela Jones Harbour Joins Cloud Security Alliance as Co-Chair of Legal Working Group

Press Release Published: 05/16/2011

Former Federal Trade Commissioner Brings Significant Experience to Mission of Bridging the Gap Between Cloud Technology and the Law New York, NY – May 16, 2011 – The Cloud Security Alliance (CSA) announced that former Federal Trade Commissioner Pamela Jones Harbour has signed on as a co-chair of...

Security Standards – Why they are so Critical for the Cloud

Blog Published: 05/13/2011

By Matthew GardinerEveryone loves standards, right? When is the last time you heard a vendor proudly say that their product or service was closed and proprietary? However, it also seems that every time a new IT architecture sweeps through the market, this time one based on cloud models, the les...

OAuth - authentication & authorization for mobile applications

Blog Published: 05/06/2011

By Paul MadsenFederation is a model of identity management that distributes the various individual components of an identity operation amongst different actors. The presumption being that the jobs can be distributed according to which actors are best suited or positioned to take them on. For inst...

Who Moved My Cloud

Blog Published: 05/04/2011

by Allen Allison, Chief Security Officer at NaviSite (www.navisite.com)Managed cloud services are quickly being adopted by large enterprises. Organizations are increasingly embracing cloud technologies for core services like financial systems, IT infrastructure, online merchant sites, and messagi...

Cloud Computing and Device Security: The “Always Able” Era

Blog Published: 04/29/2011

By Mark Bregman, CTO of SymantecDevice Proliferation: Mobility and Security in the CloudChief Information Security Officers know instinctively that the world under their purview is undergoing a shift every bit as significant as the rise of the World Wide Web more than 15 years ago. The demand on ...

Cloud Security Alliance Announces Key Initiative in Development of Cloud Security Standards in Partnership with ISO/IEC

Press Release Published: 04/21/2011

CSA Establishes Category C Liaison Relationship with ISO/IEC JTC 1/SC 27 London, ENGLAND – #CSASummit at #InfosecUK– April 20, 2011 – At the CSA Summit at Infosecurity Europe, the Cloud Security Alliance (CSA) announced that it will have a key role in the development of cloud security and priva...

Is Tokenization or Encryption Keeping You Up at Night?

Blog Published: 04/20/2011

By Stuart Lisk, Senior Product Manager, HubspanAre you losing sleep over whether to implement tokenization or full encryption as your cloud security methodology? Do you find yourself lying awake wondering if you locked all the doors to your sensitive data? Your “sleepless with security” insomnia ...

Protect the API Keys to your Cloud Kingdom

Blog Published: 04/18/2011

API keys to become first class citizens of security policies, just like SSL keysBy Mark O’Neill, CTO, VordelMuch lip service is paid to protecting information in the Cloud, but the reality is often seat-of-the-pants Cloud security. Most organizations use some form of API keys to access their clou...

Constant Vigilance

Blog Published: 04/14/2011

By Jon Heimerl Constant Vigilance. Mad-Eye Moody puts it very well. Constant Vigilance.Unfortunately, these days we need constant vigilance to help protect ourselves and companies from peril. That is not to say that we can never relax and breathe. This is based on a key part of any decent cyber-...

Cloud Annexation

Blog Published: 04/12/2011

By Stephen R CarterThe Cloud is the next evolutionary step in the life of the Internet. From the experimental ARPANET (Advanced Research Projects Agency Network) to the Internet to the Web – and now to the Cloud, the evolution continues to advance international commerce and interaction on a grand...

Privileged Administrators and the Cloud: Who will Watch the Watchmen?

Blog Published: 04/01/2011

By Matthew GardinerOne of the key advantages of the cloud, whether public or private, flows from a well-known econometric concept known as “economies of scale.” The concept of economies of scale refers to an operation that to a point gets more efficient as it gets bigger – think electricity power...

Debunking the Top Three Cloud Security Myths

Blog Published: 03/30/2011

By Margaret DawsonThe “cloud” is one of the most discussed topics among IT professionals today, and organizations are increasingly exploring the potential benefits of using cloud computing or solutions for their businesses. It’s no surprise Gartner predicts that cloud computing will be a top prio...

Looking for the CCM?

Start using the Cloud Controls Matrix to simplify compliance with multiple standards & regulations.