What’s New With the Security as a Service Working Group?
Blog Published: 12/09/2013
CSA members are invited to join the Security-as-a-Service Working Group (SecaaS WG) which aims to promote greater clarity in the Security as a Service model. Why a Security as a Service Working Group? Numerous security vendors are now leveraging cloud based models to deliver security solutions....
CloudTrust Protocol (CTP) Working Group Kicks Off at CSA Congress
Blog Published: 12/06/2013
The Cloud Trust Protocol (CTP) aims to provide a protocol to enable Cloud Users to query Cloud Providers in real time about the security level of their service. It aims to foster transparency and trust in the cloud supply chain, bringing greater visibility to cloud users and providing them with d...
Cloud Security Alliance Releases Software Defined Perimeter (SDP) Framework Details
Press Release Published: 12/05/2013
New White Paper Outlines Best Practices to Deploy an SDP to Protect Application Infrastructure from Network-based Attacks Orlando, FL – CSA Congress 2013 – December 5, 2013 – The Cloud Security Alliance (CSA), a not-for-profit organization which promotes the use of best practices for providi...
SAFECode and the Cloud Security Alliance Release Guidance for the Secure Development of Cloud Applications
Press Release Published: 12/05/2013
New Paper Outlines Practical Software Security Recommendations to Address Threats Specific to Cloud Computing Orlando, Fla. – Cloud Security Alliance Congress – Dec. 5, 2013 – The Cloud Security Alliance (CSA), a not-for-profit organization which promotes the use of best practices for providing ...
Cloud Security Alliance Announces Annual Ron Knode Service Award Winners
Press Release Published: 12/04/2013
Six Outstanding Individual CSA Volunteers Selected to Honor the Legacy of Late CSA Member and Volunteer Contributor Ron Knode Orlando, FL – CSA CONGRESS 2013 - December 5, 2013 –The Cloud Security Alliance (CSA) today announced the recipients of its second annual Ron Knode Service Award, an annu...
Introducing the CSA Financial Services Working Group
Blog Published: 12/04/2013
At our annual CSA Congress today, the CSA is pleased to introduce the new Financial Services Working Group (FSWG), which aims to provide knowledge and guidance on how to deliver and manage secure cloud solutions in the financial industry, and to foster cloud awareness within the sector and relate...
Introducing the CSA’s Anti-Bot Working Group
Blog Published: 12/04/2013
Among the many exciting new working groups being established and meeting at CSA Congress, today we’d like to also introduce our Anti-Bot Working Group. Chaired by Shelbi Rombout from USBank, this group’s mission is to develop and maintain a research portfolio providing capabilities to assist the ...
Introducing the CSA’s New Virtualization Working Group
Blog Published: 12/03/2013
There’s been a lot of noise around the establishment of new working groups at this year’s Congress and today we’d like to also introduce another important addition: the Virtualization Working Group. Chaired by Kapil Raina of Zscaler, the Virtualization Working Group is chartered to lead research ...
Announcing the Consensus Assessments Initiative Questionnaire (CAIQ) V.3 Open Review Period
Blog Published: 12/03/2013
At CSA Congress 2013 this week we are announcing the open review period of the Consensus Assessments Initiative Questionnaire (CAIQ) v.3 and we hope you will take a few moments and provide your input to this very important initiative. Lack of security control transparency is a leading inhibitor ...
Cloud Security Alliance Announces Bonus Workshop Series At 2013 US Congress
Press Release Published: 11/22/2013
San Francisco, CA – November 21, 2013 –The Cloud Security Alliance (CSA) announced a series of five bonus workshops that will be featured at the 2013 US Congress event from December 3-6 in Orlando, Florida. The five workshops will provide participants with the opportunity to explore key topics in...
How Snowden Breached the NSA
Blog Published: 11/20/2013
NOVEMBER 12TH, 2013 - BY: KEVIN BOCEK How Edward Snowden did it and is your enterprise next? There’s one secret that’s still lurking at the NSA: How did Edward Snowden breach the world’s most sophisticated IT security organization? This secret has as much to do with the NSA as it does with your o...
Seeing Through the Clouds
Blog Published: 11/20/2013
By TK Keanini, CTO, LancopeThe economics of cyber-attacks have changed over the years. Fifteen years ago, it was all about network penetration, but today advanced attackers are more concerned about being detected. Similarly, good bank robbers are concerned about breaking into the bank, but great ...
Cloud Collaboration: Maintaining Zero Knowledge across International Boundaries
Blog Published: 11/20/2013
The increasingly global nature of business requires companies to collaborate more and more across borders, exchanging all manner of documents: contracts, engineering documents and other intellectual property, customer lists, marketing programs and materials, and so on. Unfortunately, the combinat...
Protecting Your Company from Backdoor Attacks – What You Need to Know
Blog Published: 11/20/2013
November 14th, 2013By Sekhar Sarukkai “We often get in quicker by the back door than the front” — Napoleon Bonaparte A rare example of a backdoor planted in a core industry security standard has recently come to light. It is now widely believed that the NSA compromised trust in NIST’s encrypti...
Cloud Security Alliance Adds New Board Member
Press Release Published: 11/19/2013
Seattle, WA – November 19, 2013 – The Cloud Security Alliance (CSA), a not-for-profit organization which promotes the use of best practices for providing security assurance within cloud computing, today announced that it has appointed Adrienne Hall to its Board of Directors. Hall, general mana...
Thoughts and key takeaway: Cloud Security Alliance CEE summit
Blog Published: 11/18/2013
The Cloud Security Alliance Central Eastern Europe Summit gave a good opportunity to learn about the Cloud Computing market in areas of Europe that are less reviewed. The congress, held in the center of the old city of Ljubljana, provided interesting mixture of Information Security professionals ...
What should cloud enabled data security protections look like in the future?
Blog Published: 11/18/2013
While listening to one of my favorite podcasts about two months ago, I heard a quote from a man named William Gibson that really resonated with me. He said, "The future is here already, it's just not evenly distributed". As I was driving along continuing to listen, it really started the synapses ...
Cloud Security Alliance Establishes Second Official Chapter In India
Press Release Published: 11/14/2013
New Chapter in Bangalore India to Promote the Secure Adoption of Cloud Computing Across India Seattle, WA – November 14, 2013 - The Cloud Security Alliance (CSA) today announced the formation of its latest new chapter in Bangalore, India. In recognition of the importance of India’s role as a majo...
Bob Flores, Former CTO Of The CIA, To Keynote CSA Congress 2013
Press Release Published: 11/13/2013
Keynote to Address ‘Unifying Security for Cloud and Mobile: The Software Defined Perimeter’ Orlando, FL – November 13, 2013 – The Cloud Security Alliance (CSA) today announced that Bob Flores, former CTO of the Central Intelligence Agency (CIA), has been added to the program as a keynote speak...
Cloud Security Alliance Announces Software Defined Perimeter (SDP) Initiative
Press Release Published: 11/13/2013
Las Vegas, NV – November 13, 2013 – The Cloud Security Alliance (CSA), a not-for-profit organization which promotes the use of best practices for providing security assurance within cloud computing, today announced the launch of the Software Defined Perimeter (SDP) Initiative, a project to develo...