Cloud 101CircleEventsBlog
Master CSA’s Security, Trust, Assurance, and Risk program—download the STAR Prep Kit for essential tools to enhance your assurance!

All Articles

All Articles
Featured Research: CUMULUS

Press Release Published: 03/19/2014

Cloud technology offers a powerful approach for the provision of infrastructure, platform and software services without incurring the considerable costs of owning, operating and maintaining the computational infrastructures required for this purpose.These features also introduce new challenges th...

Volunteer Spotlight: Evelyn de Souza

Press Release Published: 03/19/2014

Evelyn de Souza is a Data Privacy and Compliance Leader at Cisco Systems, where she focuses on developing blueprints and holistic solutions to help organizations embrace the cloud securely and ensure data privacy in an agile manner. She currently serves as the co-chair of the CSA Cloud Control Ma...

Featured Research: Software Defined Perimeter Initiative

Press Release Published: 03/19/2014

The cloud, and the Internet as we know it today, is an unlikely outcome from the DARPA research conducted decades ago. Through a combination of standards, innovation, and a culture of openness, we have built a remarkable foundation for our ever-changing society, as well as the global economy. As ...

CSA Announces the Newly Created Research Lifecycle

Press Release Published: 03/19/2014

The Cloud Security Alliance research team announces the newly created Research Lifecycle, a comprehensive, step-by-step guide that sets up a series of standard procedures for the generation of a CSA research product. It is our goal to streamline the research process, making it easier for voluntee...

Phillip Redman to speak at the next Cloud Security Alliance Mobile Working Group meeting on March, 27 @ 9am PT

Press Release Published: 03/19/2014

Speaker: Phillip Redman – Vice President, Citrix Mobile Solutions and Strategy Join us to learn Phillip's views on the enterprise mobility space and to get a chance to interact with one of the most respected thought leaders in this space. About: Phillip Redman is vice president of mobile solut...

CSA Seeks Input For Open Peer Review: Big Data Taxonomy

Press Release Published: 03/19/2014

The Cloud Security Alliance (CSA) Big Data Working Group (BDWG) would like to invite you to review and comment on a preliminary draft of the "Big Data Taxonomy" document. In this document, we propose a seven-dimensional taxonomy for big data. The main objective of this taxonomy is to help decisi...

RSA Conference 2014: Recap and Attendee Vulnerability Survey

Blog Published: 03/19/2014

BY: GAVIN HILL, DIRECTOR, PRODUCT MARKETING AND THREAT INTELLIGENCE, VENAFI I’ve been attending RSA for many years now, each year it seems to get bigger and better. This year a record breaking 28,500 attendees were in San Francisco to learn how to stop cyber-criminals in their ever increasing mal...

Cloud Security Alliance Opens Call for Presentations for EMEA Congress 2014

Press Release Published: 03/17/2014

**Rome, Italy – March 17, 2014 - **The Cloud Security Alliance and MIS Training Institute have opened the call for papers for the 2014 EMEA Congress, to be held November 19-20th at the Parco dei Principi in Rome. CSA EMEA Congress is Europe’s premier cloud security event - an information-hub for ...

SecureCloud 2014 Late-Breaking Keynote Addition Richard A. Clarke, former US National Coordinator for Security, Infrastructure Protection, and Counter-terrorism

Press Release Published: 03/17/2014

Edinburgh (UK), Amsterdam (NL) and Seattle, WA – March 17, 2014 – The Cloud Security Alliance (CSA) today announced that Richard A. Clarke, Chairman and CEO of Good Harbor and Member of President Obama’s Review Group on Intelligence and Communications Technology has been added as a keynote prese...

The Evolution of Mobile Malware: Digitally Signed Malware Creates an Illusion of Trust

Blog Published: 03/11/2014

By Patriz Regalado, Product Marketing Manager, Venafi Because cyber-criminals always seem to find new ways to circumvent traditional security measures, the threat landscape is constantly changing. A McAfee Labs Threat Report in Q3 2013 revealed an alarming trend: the type of malware proliferating...

The Mask, Attacks on Trust, and Game Over

Blog Published: 03/06/2014

BY KEVIN BOCEK, VP, SECURITY STRATEGY & THREAT INTELLIGENCE, VENAFI Breached Enterprises Will Be Owned by The Mask operation for Years to ComeFor over a year, Venafi has been charting the course of attacks on the trust established by keys and certificates. The dramatic rise in attacks has led...

You’re Already Compromised: Exposing SSH as an Attack Vector

Blog Published: 03/05/2014

By Gavin Hill, Director of Product Marketing and Threat Research, Venafi Before the Snowden breach, the average person rarely thought about encryption. Last year, however, encryption was at the forefront of everyone’s mind. People wanted to know what Edward Snowden disclosed about the National Se...

Infographic: New Ponemon SSH Security Vulnerability Report

Blog Published: 03/04/2014

By Gavin Hill Global organizations are under attack, and the attackers are more dangerous and persistent than ever. While the motivations vary, the goal of today’s cybercriminal is to become and remain trusted on targeted networks in order to gain full access to sensitive, regulated and valuable ...

CSA Appoints Leaders to the International Standardization Council

Blog Published: 02/27/2014

Andreas Fuchsberger Eric HibbardThe CSA announced today the re-appointment of Andreas Fuchsberger and Eric Hibbard as the Co-Chairs of the CSA’s International Standardization Council. As Co-Chairs, Fuchsberger and Hibbard will ...

Software Defined Perimeter (SDP) Yet To Be Hacked; CSA Ups the Ante on Virtual Hackathon

Press Release Published: 02/26/2014

Winner Now To Receive Full Pass to BlackHat, in Addition to DEF CON San Francisco, CA – February 26, 2014 - The Cloud Security Alliance (CSA) today announced that it has upped the ante, as no one has yet been able to hack the Software Defined Perimeter (SDP) network since the contest began on Mo...

Cloud Security Alliance Presents Industry Leadership Award To Professor Udo Helmbrecht Of Enisa

Press Release Published: 02/24/2014

Leader of European Union’s Cyber Security Agency Honored San Francisco, CA – RSA CONFERENCE - February 24, 2014 –The Cloud Security Alliance (CSA) has named Prof Udo Helmbrecht, Executive Director of the European Union Agency for Network and Information Security (ENISA), as the 2014 recipient ...

Survey Shows: SAAS Vendors Ditch User Names And Passwords, Adopt SAML In Droves

Blog Published: 02/24/2014

by Thomas Pedersen, co-founder and CEO of OneLoginLooks like we were on to something when we open sourced OneLogin’s first SAML Toolkit three years ago — theOneLogin 2014 State of SaaS Identity Management survey that we just completed with CSA shows that SaaS vendors are adopting SAML in droves. ...

CSA Invites Hackers to Participate in an Insider Attack of a Software Defined Perimeter (SDP)

Blog Published: 02/21/2014

Bob Flores, Former CTO of the CIA and President & CEO at Applicology Incorporated to Serve as Judge The Cloud Security Alliance (CSA) today announced additional details on its upcoming virtual hackathon, open to anyone globally, being held in conjunction with the RSA Conference, kicking off M...

Fake SSL Certificates Uncovered: The Tip of the Iceberg and Weaponized Trust

Blog Published: 02/19/2014

KEVIN BOCEK, VP, SECURITY STRATEGY & THREAT INTELLIGENCE, VENAFI Cybercriminals are moving faster than we think to weaponize the core element of trust on the Internet: digital certificates. The many fake certificates identified by Netcraft are just the tip of the iceberg. Cybercriminals are a...

Hack the SDP - win a trip to DEF CON!

Blog Published: 02/17/2014

Following the CSA Summit at RSA on Monday Feb 24th, the CSA will be hosting a Software Defined Perimeter workshop and a 'virtual hackathon', open to anyone.The workshop will provide a detailed demo and explanation of SDP, and will kick off the ‘virtual hackathon’ contest, which will last until 3p...

Looking for the CCM?

Start using the Cloud Controls Matrix to simplify compliance with multiple standards & regulations.