Cloud 101CircleEventsBlog
Missed CSA's Cyber Monday sale? You can still get 50% off the CCSK + CCZT Exam & Training Bundle and Token Bundle with raincheck code 'rcdoubledip24'

All Articles

All Articles
Announcing the Consensus Assessments Initiative Questionnaire (CAIQ) V.3 Open Review Period

Blog Published: 12/03/2013

At CSA Congress 2013 this week we are announcing the open review period of the Consensus Assessments Initiative Questionnaire (CAIQ) v.3 and we hope you will take a few moments and provide your input to this very important initiative. Lack of security control transparency is a leading inhibitor ...

Cloud Security Alliance Announces Bonus Workshop Series At 2013 US Congress

Press Release Published: 11/22/2013

San Francisco, CA – November 21, 2013 –The Cloud Security Alliance (CSA) announced a series of five bonus workshops that will be featured at the 2013 US Congress event from December 3-6 in Orlando, Florida. The five workshops will provide participants with the opportunity to explore key topics in...

How Snowden Breached the NSA

Blog Published: 11/20/2013

NOVEMBER 12TH, 2013 - BY: KEVIN BOCEK How Edward Snowden did it and is your enterprise next? There’s one secret that’s still lurking at the NSA: How did Edward Snowden breach the world’s most sophisticated IT security organization? This secret has as much to do with the NSA as it does with your o...

Seeing Through the Clouds

Blog Published: 11/20/2013

By TK Keanini, CTO, LancopeThe economics of cyber-attacks have changed over the years. Fifteen years ago, it was all about network penetration, but today advanced attackers are more concerned about being detected. Similarly, good bank robbers are concerned about breaking into the bank, but great ...

Cloud Collaboration: Maintaining Zero Knowledge across International Boundaries

Blog Published: 11/20/2013

The increasingly global nature of business requires companies to collaborate more and more across borders, exchanging all manner of documents: contracts, engineering documents and other intellectual property, customer lists, marketing programs and materials, and so on. Unfortunately, the combinat...

Protecting Your Company from Backdoor Attacks – What You Need to Know

Blog Published: 11/20/2013

November 14th, 2013By Sekhar Sarukkai “We often get in quicker by the back door than the front” — Napoleon Bonaparte A rare example of a backdoor planted in a core industry security standard has recently come to light. It is now widely believed that the NSA compromised trust in NIST’s encrypti...

Cloud Security Alliance Adds New Board Member

Press Release Published: 11/19/2013

Seattle, WA – November 19, 2013 – The Cloud Security Alliance (CSA), a not-for-profit organization which promotes the use of best practices for providing security assurance within cloud computing, today announced that it has appointed Adrienne Hall to its Board of Directors. Hall, general mana...

Thoughts and key takeaway: Cloud Security Alliance CEE summit

Blog Published: 11/18/2013

The Cloud Security Alliance Central Eastern Europe Summit gave a good opportunity to learn about the Cloud Computing market in areas of Europe that are less reviewed. The congress, held in the center of the old city of Ljubljana, provided interesting mixture of Information Security professionals ...

What should cloud enabled data security protections look like in the future?

Blog Published: 11/18/2013

While listening to one of my favorite podcasts about two months ago, I heard a quote from a man named William Gibson that really resonated with me. He said, "The future is here already, it's just not evenly distributed". As I was driving along continuing to listen, it really started the synapses ...

Cloud Security Alliance Establishes Second Official Chapter In India

Press Release Published: 11/14/2013

New Chapter in Bangalore India to Promote the Secure Adoption of Cloud Computing Across India Seattle, WA – November 14, 2013 - The Cloud Security Alliance (CSA) today announced the formation of its latest new chapter in Bangalore, India. In recognition of the importance of India’s role as a majo...

Bob Flores, Former CTO Of The CIA, To Keynote CSA Congress 2013

Press Release Published: 11/13/2013

Keynote to Address ‘Unifying Security for Cloud and Mobile: The Software Defined Perimeter’ Orlando, FL – November 13, 2013 – The Cloud Security Alliance (CSA) today announced that Bob Flores, former CTO of the Central Intelligence Agency (CIA), has been added to the program as a keynote speak...

Cloud Security Alliance Announces Software Defined Perimeter (SDP) Initiative

Press Release Published: 11/13/2013

Las Vegas, NV – November 13, 2013 – The Cloud Security Alliance (CSA), a not-for-profit organization which promotes the use of best practices for providing security assurance within cloud computing, today announced the launch of the Software Defined Perimeter (SDP) Initiative, a project to develo...

Cloud Security Alliance Annual Congress to Draw Industry Attention to Most Debated Issues in Cloud Computing

Press Release Published: 11/11/2013

Seattle, WA and Orlando, FL – November 11, 2013 – The Cloud Security Alliance continues to build its agenda for the upcoming Cloud Security Alliance Congress, adding a number of notable and heavily debated presentations featuring some of the industry’s most progressive thought leaders, addressing...

Cloud Security Alliance Annual Congress to Serve as Launchpad for New Research, Guidance Reports and Working Groups

Press Release Published: 11/07/2013

Orlando, FL – November 7, 2013 – The Cloud Security Alliance today released its planned research agenda and a preview of new working groups to be launched at the upcoming Cloud Security Alliance Congress 2013, taking place December 4-5 in Orlando. This year’s event will feature the release of res...

Invitation to CSA CloudBytes: Cloud Controls Matrix v3.0

Press Release Published: 11/05/2013

Don't miss your chance to join experts and learn more about the Cloud Controls Matrix and the latest release of version 3.0. RSVP HERE NOW if you haven't already! For consumers of cloud services, the decision to move forward distills down to one question, "Do I trust the provider enough for the...

Announcing CSA Congress 2013 Working Group Events

Press Release Published: 10/31/2013

In addition to the main conference (register for CSA Congress here), the following working groups will be hosting side events: Cloud Controls Matrix (CCM), 9:00am Tuesday December 3rd Consensus Assessment Initiative (CAIQ), 10:30am Tuesday December 3rd Security as a Service (SecaaS), 12:...

A New Business Case for “Why IT Matters” in the Cloud Era

Blog Published: 10/30/2013

October 23rd, 2013Author: Kamal Shah @kdshah Knowledge workers know that cloud services make our work lives easier, drive business agility and increase productivity. For instance, when colleagues need to share a file that’s too large to attach to an email message, they simply toss it into a clo...

SSH – Does Your “Cloud Neighbor” Have an Open Backdoor to Your Cloud App?

Blog Published: 10/30/2013

October 22, 2013By Gavin Hill, Director, Product Marketing & Threat Research Center at VenafiSecure Shell (SSH) is the de facto protocol used by millions to authenticate to workloads running in the cloud and transfer data securely. Even more SSH sessions are established automatically between ...

Survey for SaaS companies: State of Identity Management

Press Release Published: 10/23/2013

CSA and new corporate member OneLogin are undertaking a survey to better understand the maturity of SaaS providers in their implementation of identity management solutions. Individual survey responses are anonymous, and you will have the opportunity to receive a copy of the full survey results p...

Patching the Perpetual MD5 Vulnerability

Blog Published: 10/18/2013

October 17, 2013By Gavin Hill, Director, Product Marketing & Threat Research Center at VenafiEarlier this month, Microsoft updated the security advisory that deprecates the use of MD5 hash algorithms for certificates issued by certification authorities (CA) in the Microsoft root certificate p...

Looking for the CCM?

Start using the Cloud Controls Matrix to simplify compliance with multiple standards & regulations.