Cloud Security Alliance Annual Congress to Draw Industry Attention to Most Debated Issues in Cloud Computing
Press Release Published: 11/11/2013
Seattle, WA and Orlando, FL – November 11, 2013 – The Cloud Security Alliance continues to build its agenda for the upcoming Cloud Security Alliance Congress, adding a number of notable and heavily debated presentations featuring some of the industry’s most progressive thought leaders, addressing...
Cloud Security Alliance Annual Congress to Serve as Launchpad for New Research, Guidance Reports and Working Groups
Press Release Published: 11/07/2013
Orlando, FL – November 7, 2013 – The Cloud Security Alliance today released its planned research agenda and a preview of new working groups to be launched at the upcoming Cloud Security Alliance Congress 2013, taking place December 4-5 in Orlando. This year’s event will feature the release of res...
Invitation to CSA CloudBytes: Cloud Controls Matrix v3.0
Press Release Published: 11/05/2013
Don't miss your chance to join experts and learn more about the Cloud Controls Matrix and the latest release of version 3.0. RSVP HERE NOW if you haven't already! For consumers of cloud services, the decision to move forward distills down to one question, "Do I trust the provider enough for the...
Announcing CSA Congress 2013 Working Group Events
Press Release Published: 10/31/2013
In addition to the main conference (register for CSA Congress here), the following working groups will be hosting side events: Cloud Controls Matrix (CCM), 9:00am Tuesday December 3rd Consensus Assessment Initiative (CAIQ), 10:30am Tuesday December 3rd Security as a Service (SecaaS), 12:...
A New Business Case for “Why IT Matters” in the Cloud Era
Blog Published: 10/30/2013
October 23rd, 2013Author: Kamal Shah @kdshah Knowledge workers know that cloud services make our work lives easier, drive business agility and increase productivity. For instance, when colleagues need to share a file that’s too large to attach to an email message, they simply toss it into a clo...
SSH – Does Your “Cloud Neighbor” Have an Open Backdoor to Your Cloud App?
Blog Published: 10/30/2013
October 22, 2013By Gavin Hill, Director, Product Marketing & Threat Research Center at VenafiSecure Shell (SSH) is the de facto protocol used by millions to authenticate to workloads running in the cloud and transfer data securely. Even more SSH sessions are established automatically between ...
Survey for SaaS companies: State of Identity Management
Press Release Published: 10/23/2013
CSA and new corporate member OneLogin are undertaking a survey to better understand the maturity of SaaS providers in their implementation of identity management solutions. Individual survey responses are anonymous, and you will have the opportunity to receive a copy of the full survey results p...
Patching the Perpetual MD5 Vulnerability
Blog Published: 10/18/2013
October 17, 2013By Gavin Hill, Director, Product Marketing & Threat Research Center at VenafiEarlier this month, Microsoft updated the security advisory that deprecates the use of MD5 hash algorithms for certificates issued by certification authorities (CA) in the Microsoft root certificate p...
Safeguarding Cloud Computing One Step at a Time
Blog Published: 10/17/2013
by Manoj Tripathi, PROSThere’ve been a lot of conversations around the concept of “the cloud.” Cloud storage and cloud computing continue to emerge as significant technology and business enablers for organizations. In many cases, cloud computing is a preferred option – it’s fast to set up and aff...
Gone in 60 Months or Less
Blog Published: 10/10/2013
by Gavin Hill, Director, Product Marketing & Threat Research Center at VenafiFor years, cybercriminals have been taking advantage of the blind trust organizations and users place in cryptographic keys and digital certificates. Only now are vendors starting to respond to the use of keys and ce...
CSA Releases CCM v3.0 Info Sheet for Updates on New Controls, Domains
Press Release Published: 10/07/2013
In conjunction with its release of the Cloud Controls Matrix, v3.0, the Cloud Security Alliance has published a CCM Info Sheet that describes the CCM, changes in v3.0, and the alignment of the CCM to the "Security Guidance for Critical Areas of Focus in Cloud Computing, v3.0" and the Open Control...
The Power of “Yes”
Blog Published: 10/03/2013
by Sanjay Beri, CEO of NetskopeShadow IT is a big deal. The problem is clear: People want their apps so they can go fast. IT needs to attest that the company’s systems and data are secure and compliant.Everybody seems to have a Shadow IT solution these days. The problem is they’re all focused on ...
Cloud Security Alliance Releases Cloud Controls Matrix, Version 3.0
Press Release Published: 09/26/2013
Industry Standard for Cloud Security Now Includes Expanded Controls to Assess Cloud Service Provider Information Security Risks CSA EMEA 2013 - Edinburgh, Scotland – September 26, 2013 – The Cloud Security Alliance (CSA) today announced the release of the CSA Cloud Controls Matrix (CCM) Ve...
The Cloud Security Alliance and BSI Launch STAR Certification Program
Press Release Published: 09/25/2013
Part II of the Open Certification Framework for Cloud Providers September 25, 2013 – Edinburgh, Scotland (CSA EMEA Congress) - The Cloud Security Alliance (CSA) and BSI, the business standards company, today announced the launch of the STAR Certification program, a rigorous third party indepen...
Cloud Security Alliance Mobile Working Group Opens Annual Mobile Market Maturity Survey
Press Release Published: 09/24/2013
Group Seeks Global Input to Understand Current Market Maturity and Needed Processes to Manage Enterprise Mobile Technology CSA EMEA 2013 - Edinburgh, Scotland – September 24, 2013 – The Cloud Security Alliance (CSA) Mobile Working Group today launched its second annual Mobile Market Maturi...
Cloud Security Alliance Big Data Working Group Releases Report On Big Data Analytics For Security Intelligence
Press Release Published: 09/24/2013
New Report Provides Insight on How New Big Data Tools and Opportunities are Changing the Security Analytics Landscape CSA EMEA 2013 - Edinburgh, Scotland – September 24, 2013 – The Cloud Security Alliance (CSA) Big Data Working Group today announced the release of Big Data Analytics for Se...
Watering Hole Attacks: Protecting Yourself from the Latest Craze in Cyber Attacks
Blog Published: 09/23/2013
Author: Harold Byun, Skyhigh NetworksCyber criminals are clever and know how to evolve – you’ve got to give them that. They’ve proven this once again with their latest cyber attack strategy, the Watering Hole Attack, which leverages cloud services to help gain access to even the most secure and s...
The Consumerization of IT, BYOC, and the (New) Role of IT
Blog Published: 09/11/2013
9 September 2013Author: Brandon CookIt has been a decade since Nicolas Carr published his controversial essay “IT Doesn’t Matter” in the Harvard Business Review. Back then, he claimed that companies weren’t really getting a competitive advantage from the technology advances – the bits and bytes –...
Take the Helix Nebula Open Survey
Press Release Published: 09/03/2013
The goal of the following survey is to help the Helix Nebula consortium understand what is the general perception of the Helix Nebula initiative and to help us improve the way we inform people about its work. The completion of this survey takes no longer than 4 minutes. Take the survey now! We...
Beyond Encryption: The 5 Pillars of Cloud Data Security
Blog Published: 09/03/2013
Author: Kamal Shah, Skyhigh NetworksGiven the recent influx of cyber-security attacks and the hubbub about the National Security Agency’s PRISM program, there is lot of talk about the importance of encryption to protect corporate data in the cloud. (PRISM is a clandestine data mining operation au...