CSA Releases the Expanded Top Ten Big Data Security & Privacy Challenges
Press Release Published: 06/17/2013
Big Data remains one of the most talked about technology trends in 2013. But lost among all the excitement about the potential of Big Data are the very real security and privacy challenges that threaten to slow this momentum. Security and privacy issues are magnified by the three V’s of big data:...
Leveraging Intel from Hackers to Mitigate Risks
Blog Published: 06/14/2013
Authored by Robert Hansen“Know your enemy and know yourself and you can fight a hundred battles without disaster.” – Sun TzuA few weeks ago, I interviewed “Adam” a self-described ‘blackhat’ hacker about why he started hacking, what motivates him and others in the underground community and why he ...
CSA Seeks Input For Open Peer Review: Cloud Trust Protocol Work Group Charter
Press Release Published: 06/12/2013
The Cloud Security Alliance Cloud Trust Protocol (CTP) Working Group would like to invite you to review and comment on their updated work group charter. The CTP work group is chartered to research the areas of continuous monitoring/auditing for cloud assurance and transparency certification. The ...
Cloud Security Alliance Seeking Co-chairs for the Cloud Trust Protocol Working Group
Press Release Published: 06/12/2013
The CSA Cloud Trust Protocol (CTP) Working Group is seeking new co-chairs to lead research in the areas of continuous monitoring/auditing for cloud assurance and transparency certification. These (2) volunteer positions have a 1-year term commitment. The co-chair works in collaboration with the C...
Cloud Trust Study: Security, Privacy and Reliability in the cloud get high marks with U.S. small to mid-sized businesses
Blog Published: 06/11/2013
Comscore and Microsoft recently commissioned a study to get a pulse on what small to mid-sized businesses (SMB) think about the cloud in terms of security, privacy and reliability.The results tell us that there’s a gap between the perceptions of those not using the cloud, with the real experience...
Cloud Security Alliance Announces Keynotes For EMEA Congress 2013
Press Release Published: 06/10/2013
Edinburgh, Scotland – June 10, 2013 - MIS Training Institute and the Cloud Security Alliance are pleased to announce the initial lineup of speakers, including esteemed keynotes, for this year’s EMEA Congress, to be held in Edinburgh, Scotland, on 25th - 26th September 2013. The Congress this yea...
A Hybrid Approach for Migrating IAM to the Cloud
Blog Published: 06/10/2013
Merritt MaximDirector-Product MarketingCA TechnologiesWe continue to hear about how cloud, mobility and the consumerization of IT has the potential to transform business. However, the ongoing hype around these trends may lead some to believe that these trends require an “all or none” approach. ...
Don’t let a disaster leave your data out in the cold
Blog Published: 06/10/2013
By Andrew Wild, CSO at QualysWhen we see images from natural disasters like Hurricane Sandy of flooded neighborhoods, downed power lines and destroyed homes the first concern, of course, is for the safety of the people. But as a chief security officer I also think about how disasters affect compa...
CSA CloudBytes: HIPAA Omnibus Rule (Thursday 6/13, 12pm Pacific)
Press Release Published: 06/06/2013
Don't miss this free event! On June 13th at 12:00pm (PDT), the CSA Health Information Working Group will be hosting a webinar on: The HIPAA Omnibus Rule The speakers will provide a detailed overview of the provisions of the HIPAA Omnibus Rule, which became effective March 26, 2013, with transi...
New York State launches investigation of top insurance companies’ cybersecurity practices. Who’s next?
Blog Published: 06/05/2013
The following blog excerpt on “New York State launches investigation of top insurance companies’ cybersecurity practices. Who’s next?” was written by the external legal counsel of the CSA, Ms. Francoise Gilbert of the IT Law Group. We repost it here with her permission. It can be viewed in its or...
How the “Internet of Things” Will Feed Cloud Computing’s Next Evolution
Blog Published: 06/05/2013
David Canellos, PerspecSys president and CEOWhile the Internet of things is not a new concept (Kevin Ashton first coined the term in 1999 to describe how the Internet is connected to the physical world), it is just now becoming a reality due to some major shifts in technology.According to ABI Res...
Rethink cloud security to get ahead of the risk curve
Blog Published: 06/05/2013
By Kurt Johnson, Courion CorporationEver since the cloud sprung up to the top of every IT discussion, the issue of cloud security was right alongside it. Let’s face it, enterprise security has never been easy, and the rapidly expanding use of software in the cloud has added layers of complexity –...
White Paper Analysing Cloud Vulnerability Incidents from 2008-2012 released by the CSA Cloud Vulnerabilities Working Group
Press Release Published: 05/31/2013
A white paper studying cloud computing outages reported by the media over a four year period has been released by the newly-established CSA Cloud Vulnerabilities Working Group. The team from the Cyber Security Lab, University of Waikato, in New Zealand, and School of Mechanical & Aerospace En...
Cloud Computing Trends: Assessing IT Maturity and Adoption Practices
Blog Published: 05/23/2013
By John Howie, COO, Cloud Security AllianceIn keeping with our CSA mission to promote best practices for providing security assurance, I have a few resources to share that can help organizations understand cloud computing trends and assess their own current IT environment with regard to security,...
Building Trust and Security Through Transparency of Service
Blog Published: 05/21/2013
By David Baker, CSO at OktaWith the growing movement of enterprises to the cloud, it’s more important than ever that service providers demonstrate and prove good security practices to their customers, in good times and in bad. During an incident, how a cloud provider communicates to its customers...
Cloud Security Alliance APAC Defines 2013-2014 Research Roadmap
Press Release Published: 05/16/2013
CSA CONGRESS ASIA PACIFIC – Singapore - May 16, 2013 – The Cloud Security Alliance (CSA), a not-for-profit organization with a mission to promote the use of best practices for providing security assurance within Cloud Computing, today announced at the CSA APAC Congress that its APAC region leader...
Plugging "Cloud Identity Leaks" - Why Your Business Should Become an Identity Provider
Blog Published: 05/15/2013
By Mark O’Neill VP Innovation – API & Identity Management, Axway (following Vordel acquisition)Most people have used the Facebook, Twitter, or Google Apps buttons located on Websites to log into third party services. This approach is useful within consumer IT as it enables the user to access ...
Cloud-to-Ground, The Last Frontier?
Blog Published: 05/15/2013
Whilst Cloud-to-Cloud service integration is relatively straight forward, Cloud service to on premise integration presents more challenges for the enterprise architect By Ed King, VP Product Marketing – Axway (following acquisition of Vordel) Cloud-to-Cloud security integration is now a fairly w...
Cloud Security Alliance Develops Third-Party Certification Scheme with Infocomm Development Authority of Singapore
Press Release Published: 05/15/2013
CSA CONGRESS ASIA PACIFIC – Singapore - May 15, 2013 – The Cloud Security Alliance (CSA), a not-for-profit organization with a mission to promote the use of best practices for providing security assurance within Cloud Computing, today announced a new partnership with the Infocomm Development Auth...
Cloud Security Alliance Successfully Completes Open Certification Framework (OCF) Pilot Implementations with Alibaba and New Taipei City Government
Press Release Published: 05/15/2013
Representatives to Discuss Cloud Computing Pilot Results and Key Learnings at CSA Congress APAC CSA CONGRESS ASIA PACIFIC – Singapore - May 15, 2013 – The Cloud Security Alliance (CSA) today announced the successful completion of the Open Certification Framework’s (OCF) STAR Certification pi...