Cloud 101CircleEventsBlog
Don't miss out! Join us for the free, virtual Global AI Symposium from October 22nd - 24th—register today!

All Articles

All Articles
CSA Seeks Input on CCM v1.3 FedRAMP Mapping Document

Press Release Published: 08/06/2012

The Cloud Security Alliance (CSA) Cloud Controls Matrix (CCM) Working Group (WG) would like to invite you to review and comment on a preliminary draft of CCM v1.3 with a revised mapping of the Federal Risk and Authorization Management Program (FedRAMP) security controls published January 2012. Th...

Consumerization 101 – Employee Privacy vs. Corporate Liability

Blog Published: 07/31/2012

Mary D. joined MD&M Inc. in 2009. Being an Apple enthusiast, she was quite excited to learn that the company offered an innovative BYOD program that allows employees to use their own iPhone for work. As part of the new hire package, Mary signed the acceptable use policy and was granted access...

Take the Top Threats to Cloud Computing Survey

Press Release Published: 07/24/2012

The Cloud Security Alliance (CSA) requests your input to update the Top Threats to Cloud Computing. This survey's purpose is to identify whether the Top Threats first identified by the CSA are still relevant today. The short survey can be taken here: https://www.surveymonkey.com/s/TopThreats Resu...

Cloud Security Alliance Selects Singapore as Site for Corporate Headquarters, Continues APAC Expansion Initiative

Press Release Published: 07/20/2012

CSA and Singapore Government Undertake Long-Term Public-Private Partnership to Further The Security of Cloud Computing Singapore – July 20, 2012 – The Cloud Security Alliance (CSA) today announced the establishment of the new CSA corporate headquarters in Singapore, under an effort led by the In...

Security Considerations When Evaluating Google Apps Marketplace Applications

Blog Published: 07/19/2012

By: Tsahy Shapsa, VP of Sales & Marketing and Co-Founder, CloudLockCustomers care about the security of their data in the cloud, and security of customer data is obviously important to Google, which is why Google has invested in completing numerous security audits and certifications such as F...

Some Things To Consider When Extending Your IdM Into The Cloud

Blog Published: 07/19/2012

About AuthorMark O’Neill is CTO of Vordel, a company which enables companies to connect to mobile and cloudLike many organizations, you no doubt face the challenge of extending your IT operations into the cloud to take advantage of the many cloud-based services demanded by your users today. As yo...

CSA Research Sponsorship Opportunities Available

Press Release Published: 07/18/2012

Cloud Security Alliances announces the availability of several new opportunities to sponsor key research initiatives. Your support helps us maintain our aggressive research schedule and accelerate responsible adoption of cloud computing. These projects provide excellent marketing benefits for spo...

Article 29 Working Party cloud computing opinion: Blow to Safe Harbor?

Press Release Published: 07/16/2012

The following blog excerpt on “Article 29 Working Party cloud computing opinion: Blow to Safe Harbor?” was written by the external legal counsel of the CSA, Ms. Francoise Gilbert of the IT Law Group. We repost it here with her permission. It can be viewed in its original form at: http://searchclo...

Take the CSA Top Threats to Mobile Computing Survey

Press Release Published: 07/11/2012

The Cloud Security Alliance's Mobile Working Group requests your participation in the inaugural "Top Threats to Mobile Computing" survey. Due to the rapid adoption of mobile computing, and immediate connection to cloud computing, the CSA is creating a “Top Threats to Mobile Computing” in addition...

Cloud Security Best Practices: Sharing Lessons Learned

Blog Published: 07/10/2012

By Frank Simorjay, Sr. Product Marketing Manager, Microsoft Trustworthy ComputingCompliance regulations and frameworks can be difficult to comprehend and even harder to explain to management when it’s time to invest in mastering IT governance. TheCloud Security Alliance (CSA) has taken steps to h...

Think beyond securing the edge of the enterprise. It's time to secure the "edge of the Cloud"

Blog Published: 07/09/2012

By Ed King, VP Product Marketing, VordelEveryone is familiar with the notion of securing the edge of the enterprise. With the growing adoption of cloud technologies, IT must now also think about securing the "edge of the Cloud". The edge of the Cloud is the perimeter around any Cloud environmen...

CSA Seeks Input on "Mobile Device Management: Key Components" whitepaper

Press Release Published: 07/07/2012

With the growth in the number of applications, content, and data being accessed through a variety of devices, Mobile Device Management (MDM) is vital to managing the mobile enterprise. MDM is about much more than device management alone—it includes system-centric functionality to secure and manag...

Cloud Security Alliance, Esther Dyson and Amrita University Co-Chair ‘Startup Pitchfest’ at SecureIT

Press Release Published: 07/02/2012

Pitchfest to be Co-located with First International Conference on Security of Internet of Things, Keynoted by CSA’s Executive Director Jim Reavis Kerala, India, July 2, 2012 – The Cloud Security Alliance (CSA), as part of the CSA Innovation Initiative, along with Esther Dyson and Amrita Uni...

CNIL (French Data Protection Authority) Recommendations on the use of Cloud Computing Services

Press Release Published: 06/29/2012

The following blog entry on "CNIL on Cloud Computing" was written by the external legal counsel of the CSA, Ms. Francoise Gilbert of the IT Law Group. We repost it here with her permission. It can be viewed in its original form at: http://www.francoisegilbert.com/2012/06/cnil-on-cloud-computing/ ...

CNIL (French Data Protection Authority) recommendations on the use of cloud computing services

Blog Published: 06/28/2012

On June 25, CNIL – the French Data Protection Authority – published its recommendation on the use of cloud computing services. This recommendation is the result of a research project on cloud issues, which started in the Fall of 2011 with a consultation with industry. The documents released by CN...

CSA Launches PhD Studentship Programme in Europe CSA Calls for University Participation in PhD and Postgraduate Studentship Programme for Security and Privacy in Cloud Computing

Press Release Published: 06/28/2012

EDINBURGH, SCOTLAND – June 28, 2012 – The Cloud Security Alliance (CSA) today announced a PhD studentship programme in the context of its Education and Training activities. CSA will partner with universities and research centers in Europe to recruit talented PhD researchers in the area of cloud s...

CSA Seeks Input on Top Threats to Mobile Computing Document

Press Release Published: 06/27/2012

The Cloud Security Alliance's Mobile Working Group requests your review and survey participation for the first "Top Threats to Mobile Computing". Currently the CSA has a working group dedicated to tracking and reporting on the top X threats to the cloud. That project is currently working on rev...

Free Your Data & the Apps Will Follow – But what About Security?

Blog Published: 06/22/2012

About AuthorMark O’Neill is CTO of Vordel, a company which enables companies to connect to mobile and cloud Application Programming Interfaces (API) represent such an important technology trend, that new business models are evolving on top of them, and this has led to the term “The API economy”. ...

Outline of BCR for Processors Published by Article 29 Working Party

Press Release Published: 06/20/2012

On June 19th, the Article 29 Working Party, which is composed of Data Protection Authorities from the member states of the European Union, released an important opinion on the use of a legal means to move personal data outside of the border of the EU, called Binding Corporate Rules (BCRs). The gu...

Brochure Now Available for the Cloud Security Alliance EMEA Congress in Amsterdam

Press Release Published: 06/20/2012

The Cloud Security Alliance is delighted to announce that the brochure for the Cloud Security Alliance EMEA Congress 2012, 25th -26th September, Amsterdam is now available to download from www.cloudsecuritycongress.com. The agenda is packed full of keynotes and case studies from the leading exper...

Looking for the CCM?

Start using the Cloud Controls Matrix to simplify compliance with multiple standards & regulations.