Cloud 101CircleEventsBlog
Master CSA’s Security, Trust, Assurance, and Risk program—download the STAR Prep Kit for essential tools to enhance your assurance!

All Articles

All Articles
CSA CEE Summit 2013 Call for Speakers

Press Release Published: 05/14/2013

The first CSA CEE Summit 2013 will be held on 23 October at City Hotel in Ljubljana, Slovenia. The congress’s unique mix of R&D, policy makers and regulators, end-user and industry audience members, promises interesting discussions, networking and business opportunities throughout the event....

Cloud Security Alliance Expands APAC Region Leadership Team

Press Release Published: 05/10/2013

Leaders from Microsoft, University of Waikato, Phitech Corporation and ASEAN to Guide Organization’s Rapid Growth of CSA in APAC Market CSA CONGRESS ASIA PACIFIC – Singapore - May 10, 2013 -– The Cloud Security Alliance (CSA), a not-for-profit organization with a mission to promote the use of ...

CSA Cloud Bytes: Big Data Analytics (Tues 5/7, 10am PDT)

Press Release Published: 05/03/2013

As part of our mission to educate the industry on all matters related to the cloud, CSA Cloud Bytes would like to present a webinar on Big Data Analytics. On May 7th, the CSA Big Data Working Group will be hosting a webinar highlighting: Michael Stonebraker - Scalable Complex Analytics and DBMSs ...

Security Check List: An Ounce of Prevention is Better than a Pound of Cure

Blog Published: 04/30/2013

By Wolfgang KandekIt is common belief that buying more robust and expensive security products will offer the best protection from computer-based attacks; that ultimately the expenditure pays off by preventing data theft. According to Gartner, more than $50 billion is spent annually on security in...

Identity Management Plays a Key Role in Mobile Device Management (MDM)

Blog Published: 04/30/2013

By: Dan Dagnall, Chief Technology Strategist, Fischer International IdentityAs BYOD and other mobile device related initiatives take hold, sooner rather than later, identity management will once again be considered as an enforcement mechanism; and rightly it should.Identity and access management ...

How to Adopt the Public Cloud While Attaining Private Cloud Control and Security

Blog Published: 04/26/2013

Earlier this year, McKinsey & Company released an article titled “Protecting information in the cloud,” discussing the increased use of cloud computing by enterprises across several industries and the benefits and risks associated with cloud usage. The article recognizes that many organizatio...

Cloud-Based Identity Management: Best Practices for Rapid End-User Adoption

Blog Published: 04/26/2013

By Glenn Choquette, Director of Product Management, Fischer International Identity.Executive SummaryIdentity Management (IdM) is not new. Yet after all this time on the market, organizations still have mixed results for end-user adoption, as many organizations that rolled-out IdM years ago still ...

Cloud Security Alliance to Moderate Panel Discussion at CIO Summit Europe

Press Release Published: 04/26/2013

CHICAGO, April 25, 2013 — CDM Media announced today that the company will partner with Cloud Security Alliance (CSA), a leading not-for-profit organization dedicated to cloud computing education and promoting best practices. CSA will moderate an Executive Visions panel at the upcoming CIO Summit ...

How secure is Mobile Device Management anyway?

Blog Published: 04/25/2013

Researchers have successfully breached the Good Technology container. MDM software can only be as secure as the underlying operating system.As the adoption of smartphones and tablets grows exponentially, one of the biggest challenges facing corporate IT organizations is not the threat of losing ...

(ISC)2® and the Cloud Security Alliance Collaborate to Create New Professional Certification for Cloud Security

Press Release Published: 04/25/2013

Infosecurity Europe, London, UK – 24th April 2013: (ISC)2® (“ISC-squared”), the world’s largest not-for-profit information security professional body and administrators of the CISSP®; and the Cloud Security Alliance (CSA), a not-for-profit organisation with a mission to promote the use of best pr...

CSA Establishes Small and Medium Business Working Group and Membership Program

Press Release Published: 04/24/2013

Offerings to Help SMB Community Understand and Benefit from Cloud Computing InfoSecurity Europe – London, UK – April 24, 2013 – **The Cloud Security Alliance (CSA) today announced a new membership level and working group designed to benefit the rapidly growing needs of cloud computing among ...

Cloud APIs - the Next Battleground for Denial-of-Service Attacks

Blog Published: 04/13/2013

by Mark O'Neill In recent months, there have been a number of highly publicized cyberattacks on U.S. banks. These attacks took the form of Distributed Denial of Service (DDoS) attacks, involving enormous amounts of traffic being sent to Internet-facing banking services, rendering them unusable....

Cloud Security Alliance Seeking Speakers For US Congress 2013 In Orlando

Press Release Published: 04/01/2013

This call for speakers has ended. For more information about the event please visit the CSA Congress 2013 page. Orlando, FL – March 28, 2013 - MIS Training Institute and the Cloud Security Alliance are looking for seasoned speakers to present at the 4th Annual Cloud Security Alliance Congress U...

Going up? Safety first, then send your data to the cloud

Blog Published: 03/28/2013

By: Joe Sturonas, CTO, PKWAREAs the proliferation of data continues to plague businesses, the pressure is on for companies to migrate away from their physical data centers. Cloud computing is being adopted at a rapid rate because it addresses not only the costs for physical space, but also rising...

How to Harden Your APIs

Blog Published: 03/26/2013

The market for APIs has experienced explosive growth in recent years, yet the major issues that providers still face are protection and hardening of the APIs that they expose to users. In particular, when you are exposing APIs from a cloud based platform, this becomes very difficult to achieve gi...

Three Critical Features That Define an Enterprise-Grade Cloud Service

Blog Published: 03/22/2013

By David Baker, CSO at OktaThe line between enterprise and consumer is fading as employees work from all manner of devices to access the on-premises, cloud and even consumer applications needed to get work done. But it’s important to not confuse enterprise and consumer services from a security st...

Upcoming Cloud Security Training in EMEA

Press Release Published: 03/22/2013

Securosis has recently updated the CCSK training curriculum to be in alignment with the Cloud Security Alliance Guidance V3.0, and the training class is much improved. Many of the hands-on exercises have been overhauled, and if you are looking to get familiar with cloud security you will want to ...

The Shrinking Security Model: Micro-perimeters

Blog Published: 03/20/2013

By Ed King, VP Product Marketing – Emerging Technologies, Axway (following acquisition of Vordel)As Cloud and mobile computing make enterprise IT ever more extended, the traditional security model of keeping the bad guys out and allowing only the good guys in no longer works well. While the reac...

CCSK Training to Be Held By HP Education at CSA Congress APAC

Press Release Published: 03/19/2013

HP has been named as a partner of the Cloud Security Alliance (CSA) Master Training Program. The CSA Master Training Program is designed to accelerate worldwide access and adoption of the CSA Certificate of Cloud Security Knowledge (CCSK) Certification, the industry’s most trusted user certific...

Open Survey: CIRRUS: Towards an EU Framework for Cloud Service Provider Security

Press Release Published: 03/19/2013

Certification, InteRnationalisation and standaRdization in cloUd Security (CIRRUS) is a FP7 project funded by the European Commission The objective of this project is to bring together representatives of industry organizations, law enforcement agencies, cloud services providers, standard and cer...

Looking for the CCM?

Start using the Cloud Controls Matrix to simplify compliance with multiple standards & regulations.