Invitation to CSA CloudBytes: CSA STAR Certification
Press Release Published: 02/12/2014
Don't miss your chance to join experts and learn more about the CSA STAR Certification. REGISTER HERE NOW! On Thursday, February 20th at 11:00am (Pacific Time), you are invited to attend this free CSA CloudBytes webinar. CSA STAR Certification; Increasing Transparency and Trust in the Cloud Clou...
SecureCloud Update: Neelie Kroes, VP of the European Commission to Give Opening Keynote Address
Blog Published: 02/11/2014
SecureCloud 2014 is now just under two months away and we are excited to announce that Neelie Kroes, Vice President of the European Commission, will be giving the opening keynote address on April 1st.[caption id="attachment_1197" align="alignright" width="307"] Neelie Kroes, VP of the European Co...
CSA Announces SecureCloud 2014 Conference Opening Keynote, Neelie Kroes, Vice President of the European Commission
Press Release Published: 02/11/2014
Edinburgh (UK), Amsterdam (NL) and Seattle, WA – February 11, 2014 – The Cloud Security Alliance (CSA) today announced that the esteemed Neelie Kroes, Vice President of the European Commission, will give the opening keynote at the SecureCloud 2014 conference taking place April 1-2, 2014 at the Am...
Cybersecurity absent during the State of the Union Address
Blog Published: 02/06/2014
by John DiMaria, BSII was disappointed that there was only a passing mention to cybersecurity at the recent State of the Union Address. As a matter of fact if you took a bite of your popcorn at the wrong time you missed it.I realize the president's address was focused mainly on the economy, but t...
Top Security Questions to Ask Your Cloud Provider
Blog Published: 02/06/2014
When considering a move to the cloud, there are a number of security questions that should be considered as you select a potential cloud provider. Almost all analyst and industry surveys list privacy and data security as top concern for CIOs and CISOs. Through our years of moving SMBs and large e...
What is the Cloud?
Blog Published: 02/06/2014
The cloud, aka cloud computing, has many different colloquial definitions, all of which seem to be somewhat different depending on who you are talking to. A few of the different terms you may hear are Software as a Service (SaaS), virtual enterprise, carrier (or service provider) cloud, and I am ...
Contextual Activities and Your Cloud Security Service
Blog Published: 02/05/2014
In this best practices video, Jamie Barnett reviews details of the latest Netskope Cloud Report regarding the most commonly used activities in cloud apps. Jamie discusses why understanding activity context is important when considering a cloud security service. For this reason, the movie line for...
Almost 400 Cloud Apps in Every Enterprise
Blog Published: 01/28/2014
By Krishna Narayanaswamy, Chief Scientist at Netskope On average, there are 397 cloud apps running in enterprises today. This is one of the findings in the second quarterly Netskope Cloud Report, an account of trends on cloud app adoption and usage. What makes this number interesting is that i...
Mobile Working Group 2014 Kick-Off Call
Press Release Published: 01/27/2014
Our goal will be to redefine the working group scope for mobile technologies in the cloud and continue to develop content in our current initiatives. We will be looking for contributors to further refine and develop material in: Mobile Authentication BYOD Guidance Application Security ...
Cloud Security Alliance Opens Call for Speakers for CSA Congress 2014
Press Release Published: 01/27/2014
Organization Also Seeks Volunteers for Conference Track Committees Seattle, WA – January 27, 2014 – The Cloud Security Alliance (CSA), a not-for-profit organization with a mission to promote the use of best practices for providing security assurance within Cloud Computing, today issued a Call fo...
6 Prerequisites to Guide a Cloud App Policy Your Employees (and IT Department!) Will Love
Blog Published: 01/23/2014
By Sanjay Beri, Founder and CEO, NetskopeIn today’s cloud-dominated business world, it is difficult for IT departments to get a hold of exactly where their data lies and who has access to it. Enterprise security is and will continue to be a big concern because of this, but a “zero trust” policy ...
Five Distinguished Security Experts to Keynote SecureCloud 2014
Blog Published: 01/22/2014
SecureCloud 2014 is just around the corner and the CSA is pleased to announce the keynote speaker lineup for this must-attend event, which is taking place in Amsterdam on April 1-2.This year’s event will feature keynote addresses from the following five security experts on a wide range of cloud s...
Cloud Security Alliance SecureCloud 2014 Conference Keynote Speakers to Address Cryptography, Confidentiality and Large Enterprise User Security
Press Release Published: 01/22/2014
Edinburgh (UK), Amsterdam (NL) and Seattle, WA – January 22, 2013 – The Cloud Security Alliance today announced the keynote speaker line-up for the upcoming SecureCloud 2014 conference taking place April 1-2, 2014 at the Amsterdam RAI Convention Centre in Amsterdam, Netherlands. Five powerful ke...
New Conference for Privacy and Security Professionals to Share, Connect and Learn
Press Release Published: 01/16/2014
IAPP and CSA announce new strategic alliance. Portsmouth, NH – January 16, 2014 – Today, the International Association of Privacy Professionals (IAPP), the largest organization of privacy professionals in the world, announced a new strategic alliance with the Cloud Security Alliance (CSA), a not...
What Is a Trusted Threat?
Blog Published: 01/15/2014
Last month I co-presented a webinar with ISIGHT Partners, a leader in cyber-threat intelligence, to discuss a white paper that exposes how keys and certificates can be used for nefarious intentions. Our purpose was to highlight some of the tactics malicious actors use and outline their profiles i...
Health Checking for Cloud Performance
Blog Published: 01/15/2014
Steve Malmskog has more than 15 years of experience as a chief network architect.In this best practices video, Steve provides an in depth look at information you can gather about the health of nodes based on the traffic itself through in-band health checking vs. out-of-band checking which can be ...
Why companies are adopting more cloud based IT security solutions
Blog Published: 01/09/2014
We have entered the age of pervasive connectivity. Regardless of whether we are at home, in the office, or on the road, most of us are almost always connected. This trend is blurring the lines between work time and leisure time, with the same devices used for both contexts interchangeably...
Why Higher Education Institutions Need Cloud-Based Identity Providers
Blog Published: 01/09/2014
By Dan Dagnall, Chief Technology Strategist for Fischer International IdentityFederation is definitely a hot topic these days, with NSTIC attempting to create an identity ecosystem, InCommon continuing to build its service-providerfederation, and state-level initiatives gearing up (some are alrea...
Evolution of Distributed Policy Enforcement in the Cloud
Blog Published: 12/10/2013
By Krishna Narayanaswamy, chief scientist at NetskopeAs computing shifts to the cloud, so too must the way we enforce policy.Until recently, enterprise applications were hosted in private data centers under the strict control of centralized IT. Between firewalls and intrusion prevention systems, ...
Announcing the Consensus Assessments Initiative Questionnaire (CAIQ) V.3 Open Review Period
Press Release Published: 12/09/2013
At CSA Congress 2013 this week we are announcing the open review period of the Consensus Assessments Initiative Questionnaire (CAIQ) v.3 and we hope you will take a few moments and provide your input to this very important initiative. Lack of security control transparency is a leading inhibitor ...