Cloud 101CircleEventsBlog
The CCSK v5 and Security Guidance v5 are now available!

All Articles

All Articles
Tempest in Cloud Computing Market: Will EU Article 29 Working Party’s Opinion Force a Rethink of the Safe Harbor Principles?

Press Release Published: 08/08/2012

The following article excerpt on “Tempest in Cloud Computing Market: Will EU Article 29 Working Party’s Opinion Force a Rethink of the Safe Harbor Principles?” was written by the external legal counsel of the CSA, Ms. Francoise Gilbert of the IT Law Group. We repost it here with her permission. P...

Helix Nebula Science Cloud Passes First Major Test

Press Release Published: 08/07/2012

Proof of concept results demonstrate that CERN, EMBL and ESA have succeeded in deploying challenging scientific applications on Helix-Nebula cloud August 7, 2012 –"Helix Nebula – the science cloud,” set up earlier this year to support the massive IT requirements of European scientists has succes...

PhD studentship in Cloud Service Security (Software Engineering Group)

Press Release Published: 08/07/2012

The Software Engineering Group within the School of Informatics of the City University London invites applications for a PhD studentship funded by the Cloud Security Alliance (CSA EMEA), connecting PhD students with industry partners from CSA's corporate members, to enhance research deployability...

CSA Seeks Input on SecaaS Categories of Service Implementation Guidance Documents

Press Release Published: 08/07/2012

As we did with the first wave of SecaaS peer reviews, the CSA Security as a Service (SecaaS) Working Group has expanded upon their "Defined Categories of Service" document released last year. Implementation Guidance documents, for each category of service previously defined, are being developed ...

CSA Seeks Input on CCM v1.3 FedRAMP Mapping Document

Press Release Published: 08/06/2012

The Cloud Security Alliance (CSA) Cloud Controls Matrix (CCM) Working Group (WG) would like to invite you to review and comment on a preliminary draft of CCM v1.3 with a revised mapping of the Federal Risk and Authorization Management Program (FedRAMP) security controls published January 2012. Th...

Consumerization 101 – Employee Privacy vs. Corporate Liability

Blog Published: 07/31/2012

Mary D. joined MD&M Inc. in 2009. Being an Apple enthusiast, she was quite excited to learn that the company offered an innovative BYOD program that allows employees to use their own iPhone for work. As part of the new hire package, Mary signed the acceptable use policy and was granted access...

Take the Top Threats to Cloud Computing Survey

Press Release Published: 07/24/2012

The Cloud Security Alliance (CSA) requests your input to update the Top Threats to Cloud Computing. This survey's purpose is to identify whether the Top Threats first identified by the CSA are still relevant today. The short survey can be taken here: https://www.surveymonkey.com/s/TopThreats Resu...

Cloud Security Alliance Selects Singapore as Site for Corporate Headquarters, Continues APAC Expansion Initiative

Press Release Published: 07/20/2012

CSA and Singapore Government Undertake Long-Term Public-Private Partnership to Further The Security of Cloud Computing Singapore – July 20, 2012 – The Cloud Security Alliance (CSA) today announced the establishment of the new CSA corporate headquarters in Singapore, under an effort led by the In...

Security Considerations When Evaluating Google Apps Marketplace Applications

Blog Published: 07/19/2012

By: Tsahy Shapsa, VP of Sales & Marketing and Co-Founder, CloudLockCustomers care about the security of their data in the cloud, and security of customer data is obviously important to Google, which is why Google has invested in completing numerous security audits and certifications such as F...

Some Things To Consider When Extending Your IdM Into The Cloud

Blog Published: 07/19/2012

About AuthorMark O’Neill is CTO of Vordel, a company which enables companies to connect to mobile and cloudLike many organizations, you no doubt face the challenge of extending your IT operations into the cloud to take advantage of the many cloud-based services demanded by your users today. As yo...

CSA Research Sponsorship Opportunities Available

Press Release Published: 07/18/2012

Cloud Security Alliances announces the availability of several new opportunities to sponsor key research initiatives. Your support helps us maintain our aggressive research schedule and accelerate responsible adoption of cloud computing. These projects provide excellent marketing benefits for spo...

Article 29 Working Party cloud computing opinion: Blow to Safe Harbor?

Press Release Published: 07/16/2012

The following blog excerpt on “Article 29 Working Party cloud computing opinion: Blow to Safe Harbor?” was written by the external legal counsel of the CSA, Ms. Francoise Gilbert of the IT Law Group. We repost it here with her permission. It can be viewed in its original form at: http://searchclo...

Take the CSA Top Threats to Mobile Computing Survey

Press Release Published: 07/11/2012

The Cloud Security Alliance's Mobile Working Group requests your participation in the inaugural "Top Threats to Mobile Computing" survey. Due to the rapid adoption of mobile computing, and immediate connection to cloud computing, the CSA is creating a “Top Threats to Mobile Computing” in addition...

Cloud Security Best Practices: Sharing Lessons Learned

Blog Published: 07/10/2012

By Frank Simorjay, Sr. Product Marketing Manager, Microsoft Trustworthy ComputingCompliance regulations and frameworks can be difficult to comprehend and even harder to explain to management when it’s time to invest in mastering IT governance. TheCloud Security Alliance (CSA) has taken steps to h...

Think beyond securing the edge of the enterprise. It's time to secure the "edge of the Cloud"

Blog Published: 07/09/2012

By Ed King, VP Product Marketing, VordelEveryone is familiar with the notion of securing the edge of the enterprise. With the growing adoption of cloud technologies, IT must now also think about securing the "edge of the Cloud". The edge of the Cloud is the perimeter around any Cloud environmen...

CSA Seeks Input on "Mobile Device Management: Key Components" whitepaper

Press Release Published: 07/07/2012

With the growth in the number of applications, content, and data being accessed through a variety of devices, Mobile Device Management (MDM) is vital to managing the mobile enterprise. MDM is about much more than device management alone—it includes system-centric functionality to secure and manag...

Cloud Security Alliance, Esther Dyson and Amrita University Co-Chair ‘Startup Pitchfest’ at SecureIT

Press Release Published: 07/02/2012

Pitchfest to be Co-located with First International Conference on Security of Internet of Things, Keynoted by CSA’s Executive Director Jim Reavis Kerala, India, July 2, 2012 – The Cloud Security Alliance (CSA), as part of the CSA Innovation Initiative, along with Esther Dyson and Amrita Uni...

CNIL (French Data Protection Authority) Recommendations on the use of Cloud Computing Services

Press Release Published: 06/29/2012

The following blog entry on "CNIL on Cloud Computing" was written by the external legal counsel of the CSA, Ms. Francoise Gilbert of the IT Law Group. We repost it here with her permission. It can be viewed in its original form at: http://www.francoisegilbert.com/2012/06/cnil-on-cloud-computing/ ...

CNIL (French Data Protection Authority) recommendations on the use of cloud computing services

Blog Published: 06/28/2012

On June 25, CNIL – the French Data Protection Authority – published its recommendation on the use of cloud computing services. This recommendation is the result of a research project on cloud issues, which started in the Fall of 2011 with a consultation with industry. The documents released by CN...

CSA Launches PhD Studentship Programme in Europe CSA Calls for University Participation in PhD and Postgraduate Studentship Programme for Security and Privacy in Cloud Computing

Press Release Published: 06/28/2012

EDINBURGH, SCOTLAND – June 28, 2012 – The Cloud Security Alliance (CSA) today announced a PhD studentship programme in the context of its Education and Training activities. CSA will partner with universities and research centers in Europe to recruit talented PhD researchers in the area of cloud s...

Looking for the CCM?

Start using the Cloud Controls Matrix to simplify compliance with multiple standards & regulations.