Cloud 101CircleEventsBlog
The CCSK v5 and Security Guidance v5 are now available!

All Articles

All Articles
Configuration Compliance in the Cloud

Blog Published: 04/25/2012

By David Meltzer As a member solution provider in the Cloud Security Alliance, paying careful attention to risk and planning for improvement is second nature for my own companies’ security services. As a consumer of many start-up cloud services built completely outside the security industry, how...

CSA Seeks Input on the CTP Reference Architecture Model

Press Release Published: 04/21/2012

The Cloud Security Alliance (CSA) CloudTrust Protocol (CTP) would like to invite you to review and comment on the CTP Reference Architecture Model. The CloudTrust Protocol (CTP) was invented to restore to the enterprise the ability to confirm that “whatever is claimed to be happening in the clou...

Cyber Security & Privacy EU Forum 2012, April 24th & 25th, Berlin

Press Release Published: 04/16/2012

REGISTER NOW ( http://cspforum2012.eventbrite.com/ ) Effectsplus ( http://www.effectsplus.eu/ ) in coordination with the Trust and Security Unit of DG INFSO are organizing the Cyber Security & Privacy EU Forum 2012 “CSP EU Forum 2012”. This event is a European conference on Cyber Security...

CSA Extends Deadline for Congress 12' Abstract Submissions

Press Release Published: 04/16/2012

The Cloud Security Alliance has extended the deadline for CSA Congress 12' abstract submissions. We have received some great submissions so far, but would like to see more. The NEW deadline for submission is April 27,2012. Visit the following site for CFP details: https://cloudsecurityalliance...

Top Threats to Cloud Computing Kick-Off Call

Press Release Published: 04/13/2012

Join us on our Kick-Off Call as we look for volunteers to participate in updating the CSA Top Threats to Cloud Computing document. The purpose of this document, Top Threats to Cloud Computing, is to provide needed context to assist organizations in making educated risk management decisions r...

Cloud Security Requires All Hands on Deck

Blog Published: 04/12/2012

Andrew Wild, CSO at Qualys, discusses how security postures and attitudes need to change as more and more IT functionality moves to the cloud It’s clear there are many compelling reasons, both financial and productivity-related, for enterprises to move IT functionality into the cloud, so it’s not...

CSA Seeks Input on the Big Data Working Group Charter

Press Release Published: 04/12/2012

The Cloud Security Alliance (CSA) Big Data Working Group (BDWG) would like to invite you to review and comment on the work group Charter. The Big Data Working Group (BDWG) will be identifying scalable techniques for data-centric security and privacy problems. BDWG’s investigation is expected to ...

Kudos to Microsoft! 3 Offerings Now on the STAR Registry

Blog Published: 04/11/2012

We at the CSA want to offer a hearty congratulations to the team at Microsoft, for their leadership in completing and publishing STAR assessments for their products. As of today, Office 365, Windows Azure and Dynamics all have STAR assessments completed and published.We applaud Microsoft for lead...

Inaugural CSA Summit Hong Kong & Macau

Press Release Published: 04/10/2012

The Hong Kong & Macau chapter is having their inaugural CSA Summit on 17 May 2012. To be held in Hong Kong’s Cyberport, this day-long Summit will be graced by the HK SAR’s government CIO, Mr Daniel Lai and will our very own Jim Reavis to provide the keynote. Mr Tim Grance, senior computer sci...

Cloud Security Alliance Appoints Cyber Security Industry Veteran from Trend Micro as First Asia Pacific Executive Council Chairman

Press Release Published: 04/09/2012

CSA strengthens team in Asia Pacific in preparation for the opening of its Asia Pacific headquarters in 2012 Singapore, March 21, 2012 – The Cloud Security Alliance (CSA) and Trend Micro Incorporated (TYO: 4704;TSE: 4704), a global cloud security leader, today announced the appointment of Ken L...

CSA Seeking Speakers for Congress 2012 in Orlando

Press Release Published: 04/04/2012

Abstract Submission Deadline: April 13, 2012 Cloud Security Alliance and the MIS Training Institute are looking for seasoned speakers to present at the Cloud Security Alliance Congress 2012, being held in Orlando, November 7 & 8, 2012. If you are knowledgeable in cloud computing and have ...

Jim Reavis to Speak at CloudAsia 2012

Press Release Published: 04/04/2012

CloudAsia 2012, will be a BIGGER & BETTER cloud computing event with a market-focus, industry-led agenda, organized jointly by IDA and ITM Asia. This event continues to be the only UNIQUE FORUM focusing on enterprise and telecom cloudbusiness opportunities, cloud computing marketing strategi...

Cloud Fundamentals Video Series: Bring Your Own Device and the Cloud

Blog Published: 03/28/2012

Another great video out on the Trustworthy Computing site...This latest video features Tim Rains, director, Trustworthy Computing, speaking with Jim Reavis of the CSA about the consumerization of IT and the issues that can be encountered when employees place an organization’s data on their person...

Mobile Working Group Kick-Off (Call 2)

Press Release Published: 03/20/2012

The CSA Mobile Working Group had its initial meeting at RSA-US in San Francisco. To accommodate all time zones, we will now be launching a kick-off (call 2) after our call 1 was held on March 15th, open to all individuals interested in addressing security in the mobile space. The working group is...

Health Information Management Working Group Kick-off Call

Press Release Published: 03/20/2012

Cloud Security Alliance is launching a kick-off call for the Health Information Management Working Group on March 22nd, 12:00pm PST (GMT-7), open to all individuals interested in addressing security in health information. We want to generate discussion around our charter and other areas of focus ...

New Speakers Announced for SecureCloud 2012 – managing security and privacy in the cloud

Press Release Published: 03/19/2012

CSA co-hosts the only European cloud security conference in Frankfurt am Main, Germany from May 9-10, 2012 Frankfurt, Germany – March 19, 2012 - SecureCloud 2012 is an opportunity for political and corporate decision-makers, users and providers to catch up on the latest in cloud security. High-l...

Secure Cloud – Myth or Reality?

Blog Published: 03/19/2012

Cloud Security is not a myth. It can be achieved. The biggest hindrance on debunking this myth is for enterprise businesses to begin thinking about the Cloud differently. It is not the equipment of co-location dedicated servers, or on-premises technology, as it is changeable, flexible and tran...

Seeing Through the Clouds: Gaining confidence when physical access to your data is removed

Blog Published: 03/12/2012

Cloud computing brings with it new opportunities, new frontiers, new challenges, and new chances for loss of intellectual property. From hosting simple web sites, to entire development environments, companies have been experimenting with cloud-based services for some time. Whether a company dec...

Lock Box: Where Should You Store Cloud Encryption Keys

Blog Published: 03/12/2012

Whether driven by regulatory compliance or corporate mandates, sensitive data in the cloud needs protection along with access control. This usually involves encrypting data in transit as well as data at rest in some way, shape or form, and then managing the encryption keys to access the data. The...

Big Science Teams up with Big Business to Kick-Start European Cloud Computing

Press Release Published: 03/07/2012

Geneva, 1 March 2012. Today a consortium of leading IT providers and three of Europe’s biggest research centres (CERN1, EMBL2 and ESA3) announced a partnership to launch a European cloud computing platform. "Helix Nebula - the Science Cloud", will support the massive IT requirements of European s...

Looking for the CCM?

Start using the Cloud Controls Matrix to simplify compliance with multiple standards & regulations.