CSA Releases Security Information and Event Management (SIEM) Guidance
Press Release Published: 10/29/2012
New Security-as-a-Service Implementation Report Provide Guidance for Deployment of Cloud-based SIEM October 29, 2012 –The Cloud Security Alliance (CSA) today released the Security Information and Event Management (SEIM) guidance document - as part of its Security as a Service (SecaaS) Imple...
The High Costs of Securing Identities: How to Fix the Problem Using the Cloud
Blog Published: 10/26/2012
Authored by: Dan Dagnall, Chief Technology Strategist at Fischer International Identity Identity Management is well down the path of a mature market space. But I believe there is still one final, fundamental disconnect which is driving up your cost of deploying and maintaining an identity ...
CSA Seeks Input on a Mobile App Store Security Initiative Policy Guideline Document
Press Release Published: 10/25/2012
The Cloud Security Alliance Mobile Working Group would like to invite you to review and comment on their Mobile App Store Security Initiative Policy Guideline document that was created by their Initiative 5 sub-group. This initiative will cover public and private app stores, how they handle apps,...
CSA Seeks Input on a Mobile Authentication Document
Press Release Published: 10/19/2012
The Cloud Security Alliance Mobile Working Group would like to invite you to review and comment on the Mobile Authentication Document that was created by their Initiative 4 Authentication Sub-group. Authentication with mobile devices takes many forms and this initiative helps lay out the differen...
CSA Seeks Input on a Mobile BYOD Document
Press Release Published: 10/19/2012
The Cloud Security Alliance Mobile Working Group would like to invite you to review and comment on the Bring Your Own Device (BYOD) Document that was created by their Initiative 3 BYOD Sub-group. BYOD is a growing trend in the enterprise and brings with it new challenges including a new look at p...
Late-Breaking Speakers and Sessions Complete the CSA Annual Congress Program
Press Release Published: 10/17/2012
DC Veteran Experts and New Sessions on National Security, Incident Response and Information Sharing in the Cloud Complete the Program for the Industry's Premier Gathering for IT Security Professionals Seattle, WA – October 17, 2012 **– The Cloud Security Alliance (CSA) today announced the ad...
Context + Analytics = Good Security
Blog Published: 10/17/2012
Data [dey-tuh] noun: individual facts or statisticsInformation [in-fer-mey-shuhn] noun: knowledge concerning a particular fact or circumstanceWhen does data become consumable information? When we correctly manage security, we integrate security devices into our infrastructure in a manner designed...
Red Hat Joins the Cloud Security Alliance
Blog Published: 10/17/2012
By: Cloud Computing TeamThat user concerns about security and related matters are part and parcel of how and when cloud computing—whether on-premise, in public clouds or a hybrid—gets adopted isn't news. Even if the risks are sometimes more about perception than reality, the fact remains that sur...
Take The CSA Mobile Maturity Questionnaire
Press Release Published: 10/16/2012
The Cloud Security Alliance's Mobile Working Group Requests Your Participation Smart phones, tablets, and other advanced mobile technology have now been around for a few years. These technologies continue to gain acceptance and, in some cases, prominence in the enterprise work environment. As wit...
Removing Cloud Barriers in Europe
Blog Published: 10/10/2012
No one is immune to the ever-changing technology forecast, but one constant (at least for the near future) appears to be global cloud cover. Cloud computing is arguably the most dominant theme on every enterprise’s IT list, but in Europe, it’s being met with some key challenges. The European Co...
Assessing Your IT Environment and Evaluating Cloud
Blog Published: 10/09/2012
by John Howie, COO, CSAIn many conversations with IT leaders today we discovered a common problem: they need a simple way to understand systems, processes, current policies and procedures and be able to evaluate how the cloud may help them realize lower IT security costs, improve best practice...
Cloud Security Alliance Releases (SecaaS) Implementation Guidance
Press Release Published: 10/09/2012
London, UK, #CSASummit at RSA - October 8, 2012The Cloud Security Alliance (CSA) today announced that its Security as a Service (SecaaS) Working Group has completed its peer review process and has published implementation guidance documents expanding upon their “Defined Categories of Service” doc...
Riding the Consumerization Wave
Blog Published: 10/07/2012
Rather than resist it, organizations should embrace Consumerization to unlock its business potential. This requires a strategic approach, flexible policies and appropriate security and management tools.The Consumerization of IT is the single most influential technology trend of this decade. Compa...
Data Loss from Missing Mobile Devices Ranks as Top Mobile Device Threat by Enterprises
Press Release Published: 10/04/2012
New Survey by Cloud Security Alliance Mobile Working Group Outlines Top Mobile Threats San Francisco, CA – October 4, 2012 – The Cloud Security Alliance (CSA) Mobile Working Group today released findings from a new survey that calls out the specific security concerns enterprise executives sa...
Cloud Maturity Study Reveals the Top 10 Issues Eroding Cloud Confidence
Press Release Published: 09/27/2012
New Research by Cloud Security Alliance and ISACA Identifies Government Regulations, Exit Strategies, and International Data Privacy as Top Concerns Rolling Meadows, IL, USA (27 September 2012)—Findings from a joint Cloud Security Alliance (CSA) and ISACA survey show that government regulations, ...
CSA Security as a Service (SecaaS) Working Group Completes Implementation Guidance
Press Release Published: 09/26/2012
New Identity and Access Management Research Provides Business and Technical Considerations for Implementation of SecaaS as Part of the Cloud September 26, 2012 –The Cloud Security Alliance (CSA) today announced that its Security as a Service (SecaaS) Working Group has completed its peer revi...
The Impact of Computing Power on Cryptography
Blog Published: 09/21/2012
Advanced technology is a beautiful thing. Not only has it enabled the creation of new, more efficient methods of application delivery and data storage (the Cloud is a prime example), but it’s also helped propel the development of more sophisticated solutions for data protection as well (think tok...
Cloud Security Alliance Releases Cloud Controls Matrix Version 1.3
Press Release Published: 09/21/2012
Version 1.3 Integrates Revised Mapping of FedRAMP Security Controls September 21, 2012 –The Cloud Security Alliance (CSA) today published version 1.3 of the Cloud Controls Matrix which is designed to provide fundamental security principles to guide cloud vendors and to assist prospective cl...
Call For Speakers for Cloud Security Alliance Innovation 2013 Conference
Press Release Published: 09/21/2012
Innovators New Cloud-related Security Technologies Invited to Submit Proposal by October 14 Silicon Valley, CA – September 10, 2012 – The Silicon Valley Chapter of the Cloud Security Alliance will be hosting the 2nd Annual Innovation Conference is currently seeking industry experts to submit...
CSA Identifies 17 Key Components for Effective Mobile Device Management of BYOD and Company-Owned Devices
Press Release Published: 09/20/2012
CSA Mobile Working Group Outlines Policies and Practices Enterprises Must Adopt to Prevent a Compromise in Security SEATTLE, WA – September 20, 2012 – The Cloud Security Alliance (CSA) Mobile Working Group today released Mobile Device Management: Key Components, V1.0, a research report ident...