Cloud 101CircleEventsBlog
Master CSA’s Security, Trust, Assurance, and Risk program—download the STAR Prep Kit for essential tools to enhance your assurance!

All Articles

All Articles
Cloud Security Alliance Annual Congress to Draw Industry Attention to Most Debated Issues in Cloud Computing

Press Release Published: 11/11/2013

Seattle, WA and Orlando, FL – November 11, 2013 – The Cloud Security Alliance continues to build its agenda for the upcoming Cloud Security Alliance Congress, adding a number of notable and heavily debated presentations featuring some of the industry’s most progressive thought leaders, addressing...

Cloud Security Alliance Annual Congress to Serve as Launchpad for New Research, Guidance Reports and Working Groups

Press Release Published: 11/07/2013

Orlando, FL – November 7, 2013 – The Cloud Security Alliance today released its planned research agenda and a preview of new working groups to be launched at the upcoming Cloud Security Alliance Congress 2013, taking place December 4-5 in Orlando. This year’s event will feature the release of res...

Invitation to CSA CloudBytes: Cloud Controls Matrix v3.0

Press Release Published: 11/05/2013

Don't miss your chance to join experts and learn more about the Cloud Controls Matrix and the latest release of version 3.0. RSVP HERE NOW if you haven't already! For consumers of cloud services, the decision to move forward distills down to one question, "Do I trust the provider enough for the...

Announcing CSA Congress 2013 Working Group Events

Press Release Published: 10/31/2013

In addition to the main conference (register for CSA Congress here), the following working groups will be hosting side events: Cloud Controls Matrix (CCM), 9:00am Tuesday December 3rd Consensus Assessment Initiative (CAIQ), 10:30am Tuesday December 3rd Security as a Service (SecaaS), 12:...

A New Business Case for “Why IT Matters” in the Cloud Era

Blog Published: 10/30/2013

October 23rd, 2013Author: Kamal Shah @kdshah Knowledge workers know that cloud services make our work lives easier, drive business agility and increase productivity. For instance, when colleagues need to share a file that’s too large to attach to an email message, they simply toss it into a clo...

SSH – Does Your “Cloud Neighbor” Have an Open Backdoor to Your Cloud App?

Blog Published: 10/30/2013

October 22, 2013By Gavin Hill, Director, Product Marketing & Threat Research Center at VenafiSecure Shell (SSH) is the de facto protocol used by millions to authenticate to workloads running in the cloud and transfer data securely. Even more SSH sessions are established automatically between ...

Survey for SaaS companies: State of Identity Management

Press Release Published: 10/23/2013

CSA and new corporate member OneLogin are undertaking a survey to better understand the maturity of SaaS providers in their implementation of identity management solutions. Individual survey responses are anonymous, and you will have the opportunity to receive a copy of the full survey results p...

Patching the Perpetual MD5 Vulnerability

Blog Published: 10/18/2013

October 17, 2013By Gavin Hill, Director, Product Marketing & Threat Research Center at VenafiEarlier this month, Microsoft updated the security advisory that deprecates the use of MD5 hash algorithms for certificates issued by certification authorities (CA) in the Microsoft root certificate p...

Safeguarding Cloud Computing One Step at a Time

Blog Published: 10/17/2013

by Manoj Tripathi, PROSThere’ve been a lot of conversations around the concept of “the cloud.” Cloud storage and cloud computing continue to emerge as significant technology and business enablers for organizations. In many cases, cloud computing is a preferred option – it’s fast to set up and aff...

Gone in 60 Months or Less

Blog Published: 10/10/2013

by Gavin Hill, Director, Product Marketing & Threat Research Center at VenafiFor years, cybercriminals have been taking advantage of the blind trust organizations and users place in cryptographic keys and digital certificates. Only now are vendors starting to respond to the use of keys and ce...

CSA Releases CCM v3.0 Info Sheet for Updates on New Controls, Domains

Press Release Published: 10/07/2013

In conjunction with its release of the Cloud Controls Matrix, v3.0, the Cloud Security Alliance has published a CCM Info Sheet that describes the CCM, changes in v3.0, and the alignment of the CCM to the "Security Guidance for Critical Areas of Focus in Cloud Computing, v3.0" and the Open Control...

The Power of “Yes”

Blog Published: 10/03/2013

by Sanjay Beri, CEO of NetskopeShadow IT is a big deal. The problem is clear: People want their apps so they can go fast. IT needs to attest that the company’s systems and data are secure and compliant.Everybody seems to have a Shadow IT solution these days. The problem is they’re all focused on ...

Cloud Security Alliance Releases Cloud Controls Matrix, Version 3.0

Press Release Published: 09/26/2013

Industry Standard for Cloud Security Now Includes Expanded Controls to Assess Cloud Service Provider Information Security Risks CSA EMEA 2013 - Edinburgh, Scotland – September 26, 2013 – The Cloud Security Alliance (CSA) today announced the release of the CSA Cloud Controls Matrix (CCM) Ve...

The Cloud Security Alliance and BSI Launch STAR Certification Program

Press Release Published: 09/25/2013

Part II of the Open Certification Framework for Cloud Providers September 25, 2013 – Edinburgh, Scotland (CSA EMEA Congress) - The Cloud Security Alliance (CSA) and BSI, the business standards company, today announced the launch of the STAR Certification program, a rigorous third party indepen...

Cloud Security Alliance Mobile Working Group Opens Annual Mobile Market Maturity Survey

Press Release Published: 09/24/2013

Group Seeks Global Input to Understand Current Market Maturity and Needed Processes to Manage Enterprise Mobile Technology CSA EMEA 2013 - Edinburgh, Scotland – September 24, 2013 – The Cloud Security Alliance (CSA) Mobile Working Group today launched its second annual Mobile Market Maturi...

Cloud Security Alliance Big Data Working Group Releases Report On Big Data Analytics For Security Intelligence

Press Release Published: 09/24/2013

New Report Provides Insight on How New Big Data Tools and Opportunities are Changing the Security Analytics Landscape CSA EMEA 2013 - Edinburgh, Scotland – September 24, 2013 – The Cloud Security Alliance (CSA) Big Data Working Group today announced the release of Big Data Analytics for Se...

Watering Hole Attacks: Protecting Yourself from the Latest Craze in Cyber Attacks

Blog Published: 09/23/2013

Author: Harold Byun, Skyhigh NetworksCyber criminals are clever and know how to evolve – you’ve got to give them that. They’ve proven this once again with their latest cyber attack strategy, the Watering Hole Attack, which leverages cloud services to help gain access to even the most secure and s...

The Consumerization of IT, BYOC, and the (New) Role of IT

Blog Published: 09/11/2013

9 September 2013Author: Brandon CookIt has been a decade since Nicolas Carr published his controversial essay “IT Doesn’t Matter” in the Harvard Business Review. Back then, he claimed that companies weren’t really getting a competitive advantage from the technology advances – the bits and bytes –...

Take the Helix Nebula Open Survey

Press Release Published: 09/03/2013

The goal of the following survey is to help the Helix Nebula consortium understand what is the general perception of the Helix Nebula initiative and to help us improve the way we inform people about its work. The completion of this survey takes no longer than 4 minutes. Take the survey now! We...

Beyond Encryption: The 5 Pillars of Cloud Data Security

Blog Published: 09/03/2013

Author: Kamal Shah, Skyhigh NetworksGiven the recent influx of cyber-security attacks and the hubbub about the National Security Agency’s PRISM program, there is lot of talk about the importance of encryption to protect corporate data in the cloud. (PRISM is a clandestine data mining operation au...

Looking for the CCM?

Start using the Cloud Controls Matrix to simplify compliance with multiple standards & regulations.