Big Data, Big Cloud, Big Problem
Blog Published: 08/15/2012
By Todd ThiemannBig data presents a big opportunity for businesses to mine large volumes of data from a variety of sources to make better and more high velocity decisions. Since big data implementations are practically always deployed in a cloud environment, be it a private cloud or public cloud...
CSA, EBD and IDA to Ratify Singapore APAC Headquarters at CloudSec 2012 Conference
Press Release Published: 08/14/2012
Establishment of CSA Corporate Headquarters and Partnership with Leading Singaporean Agencies to Further Cloud Security in Asia Pacific Singapore – August 15, 2012 – Further to the announcement made on July 20 that Singapore was selected as site for corporate headquarters, the Cloud Security All...
Best Practices to Secure the Cloud with Identity Management
Blog Published: 08/13/2012
Authored by: Dan Dagnall, Director of Pre-Sales Engineering at Fischer International Identity What is the “cloud identity?” The “cloud identity” begins at the birth of the user’s “digital identity” and includes the attributes to define “who you are.” “Cloud Identity” is...
Application-Aware Firewalls
Blog Published: 08/09/2012
You may have heard the term "application-aware firewalls" recently and wondered what it meant. When it comes to security, everyone thinks of Firewalls, Proxies, IPS, IDS, Honeypots, VPN devices, email security and even Web security, but most people don’t think in terms of application level securi...
Tempest in Cloud Computing Market: Will EU Article 29 Working Party’s Opinion Force a Rethink of the Safe Harbor Principles?
Press Release Published: 08/08/2012
The following article excerpt on “Tempest in Cloud Computing Market: Will EU Article 29 Working Party’s Opinion Force a Rethink of the Safe Harbor Principles?” was written by the external legal counsel of the CSA, Ms. Francoise Gilbert of the IT Law Group. We repost it here with her permission. P...
Helix Nebula Science Cloud Passes First Major Test
Press Release Published: 08/07/2012
Proof of concept results demonstrate that CERN, EMBL and ESA have succeeded in deploying challenging scientific applications on Helix-Nebula cloud August 7, 2012 –"Helix Nebula – the science cloud,” set up earlier this year to support the massive IT requirements of European scientists has succes...
PhD studentship in Cloud Service Security (Software Engineering Group)
Press Release Published: 08/07/2012
The Software Engineering Group within the School of Informatics of the City University London invites applications for a PhD studentship funded by the Cloud Security Alliance (CSA EMEA), connecting PhD students with industry partners from CSA's corporate members, to enhance research deployability...
CSA Seeks Input on SecaaS Categories of Service Implementation Guidance Documents
Press Release Published: 08/07/2012
As we did with the first wave of SecaaS peer reviews, the CSA Security as a Service (SecaaS) Working Group has expanded upon their "Defined Categories of Service" document released last year. Implementation Guidance documents, for each category of service previously defined, are being developed ...
CSA Seeks Input on CCM v1.3 FedRAMP Mapping Document
Press Release Published: 08/06/2012
The Cloud Security Alliance (CSA) Cloud Controls Matrix (CCM) Working Group (WG) would like to invite you to review and comment on a preliminary draft of CCM v1.3 with a revised mapping of the Federal Risk and Authorization Management Program (FedRAMP) security controls published January 2012. Th...
Consumerization 101 – Employee Privacy vs. Corporate Liability
Blog Published: 07/31/2012
Mary D. joined MD&M Inc. in 2009. Being an Apple enthusiast, she was quite excited to learn that the company offered an innovative BYOD program that allows employees to use their own iPhone for work. As part of the new hire package, Mary signed the acceptable use policy and was granted access...
Take the Top Threats to Cloud Computing Survey
Press Release Published: 07/24/2012
The Cloud Security Alliance (CSA) requests your input to update the Top Threats to Cloud Computing. This survey's purpose is to identify whether the Top Threats first identified by the CSA are still relevant today. The short survey can be taken here: https://www.surveymonkey.com/s/TopThreats Resu...
Cloud Security Alliance Selects Singapore as Site for Corporate Headquarters, Continues APAC Expansion Initiative
Press Release Published: 07/20/2012
CSA and Singapore Government Undertake Long-Term Public-Private Partnership to Further The Security of Cloud Computing Singapore – July 20, 2012 – The Cloud Security Alliance (CSA) today announced the establishment of the new CSA corporate headquarters in Singapore, under an effort led by the In...
Security Considerations When Evaluating Google Apps Marketplace Applications
Blog Published: 07/19/2012
By: Tsahy Shapsa, VP of Sales & Marketing and Co-Founder, CloudLockCustomers care about the security of their data in the cloud, and security of customer data is obviously important to Google, which is why Google has invested in completing numerous security audits and certifications such as F...
Some Things To Consider When Extending Your IdM Into The Cloud
Blog Published: 07/19/2012
About AuthorMark O’Neill is CTO of Vordel, a company which enables companies to connect to mobile and cloudLike many organizations, you no doubt face the challenge of extending your IT operations into the cloud to take advantage of the many cloud-based services demanded by your users today. As yo...
CSA Research Sponsorship Opportunities Available
Press Release Published: 07/18/2012
Cloud Security Alliances announces the availability of several new opportunities to sponsor key research initiatives. Your support helps us maintain our aggressive research schedule and accelerate responsible adoption of cloud computing. These projects provide excellent marketing benefits for spo...
Article 29 Working Party cloud computing opinion: Blow to Safe Harbor?
Press Release Published: 07/16/2012
The following blog excerpt on “Article 29 Working Party cloud computing opinion: Blow to Safe Harbor?” was written by the external legal counsel of the CSA, Ms. Francoise Gilbert of the IT Law Group. We repost it here with her permission. It can be viewed in its original form at: http://searchclo...
Take the CSA Top Threats to Mobile Computing Survey
Press Release Published: 07/11/2012
The Cloud Security Alliance's Mobile Working Group requests your participation in the inaugural "Top Threats to Mobile Computing" survey. Due to the rapid adoption of mobile computing, and immediate connection to cloud computing, the CSA is creating a “Top Threats to Mobile Computing” in addition...
Cloud Security Best Practices: Sharing Lessons Learned
Blog Published: 07/10/2012
By Frank Simorjay, Sr. Product Marketing Manager, Microsoft Trustworthy ComputingCompliance regulations and frameworks can be difficult to comprehend and even harder to explain to management when it’s time to invest in mastering IT governance. TheCloud Security Alliance (CSA) has taken steps to h...
Think beyond securing the edge of the enterprise. It's time to secure the "edge of the Cloud"
Blog Published: 07/09/2012
By Ed King, VP Product Marketing, VordelEveryone is familiar with the notion of securing the edge of the enterprise. With the growing adoption of cloud technologies, IT must now also think about securing the "edge of the Cloud". The edge of the Cloud is the perimeter around any Cloud environmen...
CSA Seeks Input on "Mobile Device Management: Key Components" whitepaper
Press Release Published: 07/07/2012
With the growth in the number of applications, content, and data being accessed through a variety of devices, Mobile Device Management (MDM) is vital to managing the mobile enterprise. MDM is about much more than device management alone—it includes system-centric functionality to secure and manag...