Cloud 101CircleEventsBlog
The CCSK v5 and Security Guidance v5 are now available!

All Articles

All Articles
The High Costs of Securing Identities: How to Fix the Problem Using the Cloud

Blog Published: 10/26/2012

Authored by: Dan Dagnall, Chief Technology Strategist at Fischer International Identity Identity Management is well down the path of a mature market space. But I believe there is still one final, fundamental disconnect which is driving up your cost of deploying and maintaining an identity ...

CSA Seeks Input on a Mobile App Store Security Initiative Policy Guideline Document

Press Release Published: 10/25/2012

The Cloud Security Alliance Mobile Working Group would like to invite you to review and comment on their Mobile App Store Security Initiative Policy Guideline document that was created by their Initiative 5 sub-group. This initiative will cover public and private app stores, how they handle apps,...

CSA Seeks Input on a Mobile Authentication Document

Press Release Published: 10/19/2012

The Cloud Security Alliance Mobile Working Group would like to invite you to review and comment on the Mobile Authentication Document that was created by their Initiative 4 Authentication Sub-group. Authentication with mobile devices takes many forms and this initiative helps lay out the differen...

CSA Seeks Input on a Mobile BYOD Document

Press Release Published: 10/19/2012

The Cloud Security Alliance Mobile Working Group would like to invite you to review and comment on the Bring Your Own Device (BYOD) Document that was created by their Initiative 3 BYOD Sub-group. BYOD is a growing trend in the enterprise and brings with it new challenges including a new look at p...

Late-Breaking Speakers and Sessions Complete the CSA Annual Congress Program

Press Release Published: 10/17/2012

DC Veteran Experts and New Sessions on National Security, Incident Response and Information Sharing in the Cloud Complete the Program for the Industry's Premier Gathering for IT Security Professionals Seattle, WA – October 17, 2012 **– The Cloud Security Alliance (CSA) today announced the ad...

Context + Analytics = Good Security

Blog Published: 10/17/2012

Data [dey-tuh] noun: individual facts or statisticsInformation [in-fer-mey-shuhn] noun: knowledge concerning a particular fact or circumstanceWhen does data become consumable information? When we correctly manage security, we integrate security devices into our infrastructure in a manner designed...

Red Hat Joins the Cloud Security Alliance

Blog Published: 10/17/2012

By: Cloud Computing TeamThat user concerns about security and related matters are part and parcel of how and when cloud computing—whether on-premise, in public clouds or a hybrid—gets adopted isn't news. Even if the risks are sometimes more about perception than reality, the fact remains that sur...

Take The CSA Mobile Maturity Questionnaire

Press Release Published: 10/16/2012

The Cloud Security Alliance's Mobile Working Group Requests Your Participation Smart phones, tablets, and other advanced mobile technology have now been around for a few years. These technologies continue to gain acceptance and, in some cases, prominence in the enterprise work environment. As wit...

Removing Cloud Barriers in Europe

Blog Published: 10/10/2012

No one is immune to the ever-changing technology forecast, but one constant (at least for the near future) appears to be global cloud cover. Cloud computing is arguably the most dominant theme on every enterprise’s IT list, but in Europe, it’s being met with some key challenges. The European Co...

Assessing Your IT Environment and Evaluating Cloud

Blog Published: 10/09/2012

by John Howie, COO, CSAIn many conversations with IT leaders today we discovered a common problem: they need a simple way to understand systems, processes, current policies and procedures and be able to evaluate how the cloud may help them realize lower IT security costs, improve best practice...

Cloud Security Alliance Releases (SecaaS) Implementation Guidance

Press Release Published: 10/09/2012

London, UK, #CSASummit at RSA - October 8, 2012The Cloud Security Alliance (CSA) today announced that its Security as a Service (SecaaS) Working Group has completed its peer review process and has published implementation guidance documents expanding upon their “Defined Categories of Service” doc...

Riding the Consumerization Wave

Blog Published: 10/07/2012

Rather than resist it, organizations should embrace Consumerization to unlock its business potential. This requires a strategic approach, flexible policies and appropriate security and management tools.The Consumerization of IT is the single most influential technology trend of this decade. Compa...

Data Loss from Missing Mobile Devices Ranks as Top Mobile Device Threat by Enterprises

Press Release Published: 10/04/2012

New Survey by Cloud Security Alliance Mobile Working Group Outlines Top Mobile Threats San Francisco, CA – October 4, 2012 – The Cloud Security Alliance (CSA) Mobile Working Group today released findings from a new survey that calls out the specific security concerns enterprise executives sa...

Cloud Maturity Study Reveals the Top 10 Issues Eroding Cloud Confidence

Press Release Published: 09/27/2012

New Research by Cloud Security Alliance and ISACA Identifies Government Regulations, Exit Strategies, and International Data Privacy as Top Concerns Rolling Meadows, IL, USA (27 September 2012)—Findings from a joint Cloud Security Alliance (CSA) and ISACA survey show that government regulations, ...

CSA Security as a Service (SecaaS) Working Group Completes Implementation Guidance

Press Release Published: 09/26/2012

New Identity and Access Management Research Provides Business and Technical Considerations for Implementation of SecaaS as Part of the Cloud September 26, 2012 –The Cloud Security Alliance (CSA) today announced that its Security as a Service (SecaaS) Working Group has completed its peer revi...

The Impact of Computing Power on Cryptography

Blog Published: 09/21/2012

Advanced technology is a beautiful thing. Not only has it enabled the creation of new, more efficient methods of application delivery and data storage (the Cloud is a prime example), but it’s also helped propel the development of more sophisticated solutions for data protection as well (think tok...

Cloud Security Alliance Releases Cloud Controls Matrix Version 1.3

Press Release Published: 09/21/2012

Version 1.3 Integrates Revised Mapping of FedRAMP Security Controls September 21, 2012 –The Cloud Security Alliance (CSA) today published version 1.3 of the Cloud Controls Matrix which is designed to provide fundamental security principles to guide cloud vendors and to assist prospective cl...

Call For Speakers for Cloud Security Alliance Innovation 2013 Conference

Press Release Published: 09/21/2012

Innovators New Cloud-related Security Technologies Invited to Submit Proposal by October 14 Silicon Valley, CA – September 10, 2012 – The Silicon Valley Chapter of the Cloud Security Alliance will be hosting the 2nd Annual Innovation Conference is currently seeking industry experts to submit...

CSA Identifies 17 Key Components for Effective Mobile Device Management of BYOD and Company-Owned Devices

Press Release Published: 09/20/2012

CSA Mobile Working Group Outlines Policies and Practices Enterprises Must Adopt to Prevent a Compromise in Security SEATTLE, WA – September 20, 2012 – The Cloud Security Alliance (CSA) Mobile Working Group today released Mobile Device Management: Key Components, V1.0, a research report ident...

CSA EMEA Congress: Cloud Providers Invited to Attend First Guidelines on CSA STAR Certification Presentation

Press Release Published: 09/19/2012

The plans to release a CSA Open Certification Framework that was announced at the opening of the SecureCloud 2012 conference in Frankfurt, Germany has become a reality. The Cloud Security Alliance (CSA) will release the first of its guidelines for CSA STAR CERTIFICATION, the second level of its ...

Looking for the CCM?

Start using the Cloud Controls Matrix to simplify compliance with multiple standards & regulations.