Windows Azure Leads Way with SOC 2 + CSA CCM Attestation
Blog Published: 08/22/2013
by John Howie, COO, Cloud Security AllianceThis week Microsoft announced that Windows Azure had completed an assessment against the Cloud Security Alliance Level 2 Cloud Control Matrix as part of its Service Organization Control (SOC) 2 Type II audit conducted by Deloitte. This combined approach ...
Just What the Doctor Ordered: A Prescription for Cloud Data Security for Healthcare Service Providers
Blog Published: 08/14/2013
by Kamal Shah, VP, Products and Marketing at Skyhigh NetworksCloud services are here to stay, and practically everybody is embracing them. In fact, the cloud computing industry is growing at the torrid pace of nearly 30% per year right now, according to Pike Research.Certainly healthcare service ...
Watch New CloudBytes Webinar Online: Measuring and Mitigating Risk for Cloud Services
Press Release Published: 08/08/2013
CSA has released its latest CloudBytes educational webinar, "Measuring and Mitigating Risk for Cloud Services." Hosted by Grant Shirk, Group Enterprise Product Marketing Manager for Enterprise at Box, and Kamal Shah, Vice President of Products and Marketing at Skyhigh Networks, this unique video ...
CSA CloudBytes: Cloud Compliance for Financial Services (Tuesday 8/13, 8am Pacific)
Press Release Published: 08/07/2013
Don't miss this free event! On Wednesday, July 13th at 8:00am (PDT), the CSA and the new Financial Working Group will be hosting a webinar on: Cloud Compliance for Financial Services In today’s world, financial service businesses rely on communication technology that enable rapid and secure sh...
CSA CloudBytes Town Hall: NSA/PRISM Lessons Learned (Monday 8/12, 8am Pacific)
Press Release Published: 08/06/2013
The ongoing disclosure of the extent of the PRISM program has raised major privacy and confidentiality concerns for customers of cloud-based services. A recent CSA survey of 500 respondents found that 56% of non-US residents were less likely to use US-based cloud providers, in light of recent re...
CSA and ISACA Cloud Market Maturity Survey 2013
Article Published: 07/31/2013
The Cloud Security Alliance (CSA) and ISACA is announcing the availability of a new survey on cloud market maturity as part of the second collaborative project between the two organizations. With this year's survey, the CSA and ISACA, plan to learn and share insight into the maturity of cloud com...
Cloud Security Alliance Furthers Global Transparency Efforts To Serve Association’s Rapid Growth
Press Release Published: 07/23/2013
CSA Security, Trust and Assurance Registry (STAR) Now Hosts Over 30 Entries from Major Cloud Providers; CSA Unveils Results of Survey on Government Access to Information Seattle, WA – July 23, 2013 – The Cloud Security Alliance (CSA) today announced a number of milestones in its continued effo...
CSA Seeks Input For Open Peer Review: Big Data Analytics for Security Intelligence Document
Press Release Published: 07/22/2013
The Cloud Security Alliance (CSA) Big Data Working Group would like to invite you to review and comment on a preliminary draft of the "Big Data Analytics for Security Intelligence" document. This document describes how the incorporation of Big Data is changing security analytics by providing new ...
You can Benefit from the Cloud: Choose based on Class of Service
Blog Published: 07/10/2013
In my last blog, I had promised a deeper dive into Choosing a Cloud provider based on Class of Service.It is a very timely topic. In one of very many recent articles on cloud security, Avoiding cloud security pitfalls Telstra enterprise and infrastructure services IT director Lalitha Biddulph adv...
CSA CloudBytes: Measuring and Mitigating Risk for Cloud Services (Thursday, July 18th at 10:00am Pacific)
Article Published: 07/03/2013
Don't miss this free event! On Thursday, July 18th at 10:00am (PDT), the CSA will be hosting a webinar on: Measuring and Mitigating Risk for Cloud Services The classic adage, "you can't manage what you can't measure" is just as relevant to cloud security as it is to operational excellence. Tog...
IT Opportunities Surrounding Shadow IT
Blog Published: 06/27/2013
By Kamal ShahSkyhigh Networks VP of Products and MarketingThe magnitude of Shadow IT is significant and growing.Gartner has predicted that a full 35 percent of IT spending will take place outside of IT by 2015 – just 18 months away. By the end of the decade, that figure will hit 90 percent.CIOs, ...
Cloud Security Alliance Silicon Valley Chapter to Hold 2nd Annual Innovation Conference
Press Release Published: 06/27/2013
Industry Experts to Lead Proactive and Deliberate Debates on Cloud Technology San Francisco, CA – June 27, 2013 - The Cloud Security Alliance (CSA) Silicon Valley Chapter today announced new speaker and conference details for its upcoming Innovation Conference 2013 to be held on July 18, 2013 at...
Cloud Security Alliance Establishes Incident Management and Forensics Working Group
Press Release Published: 06/27/2013
CSA’s Newest Working Group Releases First White Paper on Conducting Forensic Investigation in Cloud Environments Seattle, WA – June 27 2013 – The Cloud Security Alliance (CSA) today announced the formation of the Incident Management and Forensics Working Group, a new CSA Working Group that w...
Tech Trailblazers Awards Announces New Mentoring Partnership With Cloud Security Alliance
Press Release Published: 06/27/2013
Global enterprise technology awards strengthens ties with leading cloud security industry association London, UK – June 27 2013 – The global Tech Trailblazers Awards (Twitter: @techtrailblaze) for enterprise information technology startups today revealed a new mentoring program for award winners...
Official CSA Snowden/NSA/Patriot Act Survey
Press Release Published: 06/26/2013
We are hoping to generate a rational and valuable global dialogue, and will make this survey public. Please take the time to answer it. It is a few short questions, you can take as little or as much time as you see fit. During June of 2013, news of a whistleblower, US government contractor Eric ...
Cloud Security Alliance Announces Keynote Presentations and Sessions for 4th Annual CSA Congress
Press Release Published: 06/26/2013
Enterprise Leaders and Recognized Cloud Experts to Lead to Industry's Premier Gathering for IT Security Professionals Seattle, WA – June 26, 2013 – The Cloud Security Alliance (CSA) today announced the first keynote presentations, conference sessions and workshops for the 4th annual CSA Congre...
Cloud Security Alliance APAC Issues Call for Papers for CISO Forum 2013
Press Release Published: 06/25/2013
CSA APAC seeks proposals from practitioners, researchers, and academics on a broad range of cloud security topics CSA CONGRESS ASIA PACIFIC – Singapore – June 25, 2013– The Cloud Security Alliance (CSA), a not-for-profit organization with a mission to promote the use of best practices for provid...
Why the Cloud Cannot be treated as a One-size-fits-all when it comes to Security
Blog Published: 06/24/2013
Despite the fact that cloud providers have long since differentiated themselves on very distinct offerings based on cloud platform type, I often see the cloud written about as though it is a single, uniformservice. And, the problem with that is while there are commonalities, it is downright misle...
2nd Cloud Security Alliance Asia Pacific Chief Information Security Officer Summit 2013 Call for Presentations
Press Release Published: 06/22/2013
Proposal Submission Deadline: 26 July 2013 The Cloud Security Alliance (CSA) is pleased to announce this call for speakers to present at the prestigious 2nd Cloud Security Alliance Asia Pacific Chief Information Security Officer Summit 2013 (here forth referred as “CSA APAC CISO Summit 2013”), h...
CSA Releases the Expanded Top Ten Big Data Security & Privacy Challenges
Press Release Published: 06/17/2013
Big Data remains one of the most talked about technology trends in 2013. But lost among all the excitement about the potential of Big Data are the very real security and privacy challenges that threaten to slow this momentum. Security and privacy issues are magnified by the three V’s of big data:...