Announcing the Consensus Assessments Initiative Questionnaire (CAIQ) V.3 Open Review Period
Blog Published: 12/03/2013
At CSA Congress 2013 this week we are announcing the open review period of the Consensus Assessments Initiative Questionnaire (CAIQ) v.3 and we hope you will take a few moments and provide your input to this very important initiative. Lack of security control transparency is a leading inhibitor ...
Cloud Security Alliance Announces Bonus Workshop Series At 2013 US Congress
Press Release Published: 11/22/2013
San Francisco, CA – November 21, 2013 –The Cloud Security Alliance (CSA) announced a series of five bonus workshops that will be featured at the 2013 US Congress event from December 3-6 in Orlando, Florida. The five workshops will provide participants with the opportunity to explore key topics in...
How Snowden Breached the NSA
Blog Published: 11/20/2013
NOVEMBER 12TH, 2013 - BY: KEVIN BOCEK How Edward Snowden did it and is your enterprise next? There’s one secret that’s still lurking at the NSA: How did Edward Snowden breach the world’s most sophisticated IT security organization? This secret has as much to do with the NSA as it does with your o...
Seeing Through the Clouds
Blog Published: 11/20/2013
By TK Keanini, CTO, LancopeThe economics of cyber-attacks have changed over the years. Fifteen years ago, it was all about network penetration, but today advanced attackers are more concerned about being detected. Similarly, good bank robbers are concerned about breaking into the bank, but great ...
Cloud Collaboration: Maintaining Zero Knowledge across International Boundaries
Blog Published: 11/20/2013
The increasingly global nature of business requires companies to collaborate more and more across borders, exchanging all manner of documents: contracts, engineering documents and other intellectual property, customer lists, marketing programs and materials, and so on. Unfortunately, the combinat...
Protecting Your Company from Backdoor Attacks – What You Need to Know
Blog Published: 11/20/2013
November 14th, 2013By Sekhar Sarukkai “We often get in quicker by the back door than the front” — Napoleon Bonaparte A rare example of a backdoor planted in a core industry security standard has recently come to light. It is now widely believed that the NSA compromised trust in NIST’s encrypti...
Cloud Security Alliance Adds New Board Member
Press Release Published: 11/19/2013
Seattle, WA – November 19, 2013 – The Cloud Security Alliance (CSA), a not-for-profit organization which promotes the use of best practices for providing security assurance within cloud computing, today announced that it has appointed Adrienne Hall to its Board of Directors. Hall, general mana...
Thoughts and key takeaway: Cloud Security Alliance CEE summit
Blog Published: 11/18/2013
The Cloud Security Alliance Central Eastern Europe Summit gave a good opportunity to learn about the Cloud Computing market in areas of Europe that are less reviewed. The congress, held in the center of the old city of Ljubljana, provided interesting mixture of Information Security professionals ...
What should cloud enabled data security protections look like in the future?
Blog Published: 11/18/2013
While listening to one of my favorite podcasts about two months ago, I heard a quote from a man named William Gibson that really resonated with me. He said, "The future is here already, it's just not evenly distributed". As I was driving along continuing to listen, it really started the synapses ...
Cloud Security Alliance Establishes Second Official Chapter In India
Press Release Published: 11/14/2013
New Chapter in Bangalore India to Promote the Secure Adoption of Cloud Computing Across India Seattle, WA – November 14, 2013 - The Cloud Security Alliance (CSA) today announced the formation of its latest new chapter in Bangalore, India. In recognition of the importance of India’s role as a majo...
Bob Flores, Former CTO Of The CIA, To Keynote CSA Congress 2013
Press Release Published: 11/13/2013
Keynote to Address ‘Unifying Security for Cloud and Mobile: The Software Defined Perimeter’ Orlando, FL – November 13, 2013 – The Cloud Security Alliance (CSA) today announced that Bob Flores, former CTO of the Central Intelligence Agency (CIA), has been added to the program as a keynote speak...
Cloud Security Alliance Announces Software Defined Perimeter (SDP) Initiative
Press Release Published: 11/13/2013
Las Vegas, NV – November 13, 2013 – The Cloud Security Alliance (CSA), a not-for-profit organization which promotes the use of best practices for providing security assurance within cloud computing, today announced the launch of the Software Defined Perimeter (SDP) Initiative, a project to develo...
Cloud Security Alliance Annual Congress to Draw Industry Attention to Most Debated Issues in Cloud Computing
Press Release Published: 11/11/2013
Seattle, WA and Orlando, FL – November 11, 2013 – The Cloud Security Alliance continues to build its agenda for the upcoming Cloud Security Alliance Congress, adding a number of notable and heavily debated presentations featuring some of the industry’s most progressive thought leaders, addressing...
Cloud Security Alliance Annual Congress to Serve as Launchpad for New Research, Guidance Reports and Working Groups
Press Release Published: 11/07/2013
Orlando, FL – November 7, 2013 – The Cloud Security Alliance today released its planned research agenda and a preview of new working groups to be launched at the upcoming Cloud Security Alliance Congress 2013, taking place December 4-5 in Orlando. This year’s event will feature the release of res...
Invitation to CSA CloudBytes: Cloud Controls Matrix v3.0
Press Release Published: 11/05/2013
Don't miss your chance to join experts and learn more about the Cloud Controls Matrix and the latest release of version 3.0. RSVP HERE NOW if you haven't already! For consumers of cloud services, the decision to move forward distills down to one question, "Do I trust the provider enough for the...
Announcing CSA Congress 2013 Working Group Events
Press Release Published: 10/31/2013
In addition to the main conference (register for CSA Congress here), the following working groups will be hosting side events: Cloud Controls Matrix (CCM), 9:00am Tuesday December 3rd Consensus Assessment Initiative (CAIQ), 10:30am Tuesday December 3rd Security as a Service (SecaaS), 12:...
A New Business Case for “Why IT Matters” in the Cloud Era
Blog Published: 10/30/2013
October 23rd, 2013Author: Kamal Shah @kdshah Knowledge workers know that cloud services make our work lives easier, drive business agility and increase productivity. For instance, when colleagues need to share a file that’s too large to attach to an email message, they simply toss it into a clo...
SSH – Does Your “Cloud Neighbor” Have an Open Backdoor to Your Cloud App?
Blog Published: 10/30/2013
October 22, 2013By Gavin Hill, Director, Product Marketing & Threat Research Center at VenafiSecure Shell (SSH) is the de facto protocol used by millions to authenticate to workloads running in the cloud and transfer data securely. Even more SSH sessions are established automatically between ...
Survey for SaaS companies: State of Identity Management
Press Release Published: 10/23/2013
CSA and new corporate member OneLogin are undertaking a survey to better understand the maturity of SaaS providers in their implementation of identity management solutions. Individual survey responses are anonymous, and you will have the opportunity to receive a copy of the full survey results p...
Patching the Perpetual MD5 Vulnerability
Blog Published: 10/18/2013
October 17, 2013By Gavin Hill, Director, Product Marketing & Threat Research Center at VenafiEarlier this month, Microsoft updated the security advisory that deprecates the use of MD5 hash algorithms for certificates issued by certification authorities (CA) in the Microsoft root certificate p...