Cloud Security: An Oxymoron?
Blog Published: 11/29/2011
Written by Torsten George, Vice President of Worldwide Marketing at AgilianceCloud computing represents today's big innovation trend in the information technology (IT) space. Because it allows organizations to deploy quickly, move swiftly, and share resources, cloud computing is rapidly replac...
“On your mark … Get set … CLOUD!” (Part 1)
Blog Published: 01/06/2012
A Commentary and Essay by Ron KnodeHave you ever been in a race? I ran a lot of races during my competitive track and field career at the U.S. Naval Academy and during the dozen years thereafter. Every one of them started with the commands “On your mark … Get set … GO!” Usually a starter’s pis...
“On your mark … Get set … CLOUD!” (Part 2)
Blog Published: 01/06/2012
A Commentary and Essay by Ron KnodeMy last post introduced the notion that preparation for enterprise cloud processing is comparable to the commands, “On your mark” and “Get set,” that precede the beginning of a race. Until the “GO,” there’s no progress toward the finish line – the payoff. I o...
Cloud Fundamentals Video Series: The Benefits of Industry Collaboration to Cloud Computing Security
Blog Published: 01/19/2012
SUBJECT: Cloud Fundamentals - Video from CSA Congress with Jim Reavis, Executive Director of the CSA, and Tim Rains, Microsoft's Director of Trustworthy Computing At the CSA Congress in November, Tim Rains, Director of Trustworthy Computing for Microsoft, sat down with Jim Reavis, our execut...
Opportunity Knocks Once…
Blog Published: 02/10/2012
In 1983, I was a young electrical engineering student, when I took a job working for a small long distance company in Phoenix Arizona. For me, Opportunity had Knocked and I had just opened the door on an amazing future. In the world of communications, things were already changing and were ab...
Deprovisioning in the Cloud
Blog Published: 02/23/2012
Let's be honest: how many of you have tried logging in to one of your former employer’s accounts? Maybe you had a CRM solution and you wanted to get the name of that guy who suggested he had the next hot idea. You didn't set your out-of-office message with your new/personal contact informati...
Lock Box: Where Should You Store Cloud Encryption Keys
Blog Published: 03/12/2012
Whether driven by regulatory compliance or corporate mandates, sensitive data in the cloud needs protection along with access control. This usually involves encrypting data in transit as well as data at rest in some way, shape or form, and then managing the encryption keys to access the data. ...
Seeing Through the Clouds: Gaining confidence when physical access to your data is removed
Blog Published: 03/12/2012
Cloud computing brings with it new opportunities, new frontiers, new challenges, and new chances for loss of intellectual property. From hosting simple web sites, to entire development environments, companies have been experimenting with cloud-based services for some time. Whether a company ...
Secure Cloud – Myth or Reality?
Blog Published: 03/19/2012
Cloud Security is not a myth. It can be achieved. The biggest hindrance on debunking this myth is for enterprise businesses to begin thinking about the Cloud differently. It is not the equipment of co-location dedicated servers, or on-premises technology, as it is changeable, flexible and t...
Cloud Fundamentals Video Series: Bring Your Own Device and the Cloud
Blog Published: 03/28/2012
Another great video out on the Trustworthy Computing site...This latest video features Tim Rains, director, Trustworthy Computing, speaking with Jim Reavis of the CSA about the consumerization of IT and the issues that can be encountered when employees place an organization’s data on their per...
Kudos to Microsoft! 3 Offerings Now on the STAR Registry
Blog Published: 04/11/2012
We at the CSA want to offer a hearty congratulations to the team at Microsoft, for their leadership in completing and publishing STAR assessments for their products. As of today, Office 365, Windows Azure and Dynamics all have STAR assessments completed and published.We applaud Microsoft for l...
Cloud Security Requires All Hands on Deck
Blog Published: 04/12/2012
Andrew Wild, CSO at Qualys, discusses how security postures and attitudes need to change as more and more IT functionality moves to the cloud It’s clear there are many compelling reasons, both financial and productivity-related, for enterprises to move IT functionality into the cloud, so it’s ...
Configuration Compliance in the Cloud
Blog Published: 04/25/2012
By David Meltzer As a member solution provider in the Cloud Security Alliance, paying careful attention to risk and planning for improvement is second nature for my own companies’ security services. As a consumer of many start-up cloud services built completely outside the security industry, ...
Outsourcing B2B Integration: The Forgotten Option
Blog Published: 05/01/2012
Business continuity remains a major concern for enterprises as they move more mission-critical processes to the cloud. Outsourcing B2B integration while ensuring cloud security in order to effectively integrate business processes is challenging at best and ambiguous for certain. All too ofte...
Cloud Market Maturity
Blog Published: 05/02/2012
by Henry St. Andre, CCSK | Trust Office Director | inContactThe Cloud Security Alliance, in conjunction with ISACA will be initiating a new working group to perform research on what it means to have Market Maturity in the Cloud. This is a very interesting subject for me. I have been working ...
Are Network Perimeters the Berlin Walls of Cloud IdM?
Blog Published: 05/14/2012
A single enterprise wide identity and access management (IAM) platform is a noble but unattainable goal. The network perimeter is now a metaphorical “Berlin Wall” between the two identity platform domains of Cloud and On-Premise. It is time for enterprises to formalize a strategy of integratin...
Outline of BCR for Processors Published by Article 29 Working Party (EU)
Blog Published: 06/20/2012
http://www.francoisegilbert.com/2012/06/outline-of-bcr-for-processors-published-by-article-29-working-party/Outline of BCR for Processors Published by Article 29 Working Party On June 19, 2012, the Article 29 Working Party adopted a Working Paper (WP 195) on Binding Corporate Rules (BCR) for ...
Free Your Data & the Apps Will Follow – But what About Security?
Blog Published: 06/22/2012
About AuthorMark O’Neill is CTO of Vordel, a company which enables companies to connect to mobile and cloud Application Programming Interfaces (API) represent such an important technology trend, that new business models are evolving on top of them, and this has led to the term “The API economy...
CNIL (French Data Protection Authority) recommendations on the use of cloud computing services
Blog Published: 06/28/2012
On June 25, CNIL – the French Data Protection Authority – published its recommendation on the use of cloud computing services. This recommendation is the result of a research project on cloud issues, which started in the Fall of 2011 with a consultation with industry. The documents released by...
Think beyond securing the edge of the enterprise. It's time to secure the "edge of the Cloud"
Blog Published: 07/09/2012
By Ed King, VP Product Marketing, VordelEveryone is familiar with the notion of securing the edge of the enterprise. With the growing adoption of cloud technologies, IT must now also think about securing the "edge of the Cloud". The edge of the Cloud is the perimeter around any Cloud environ...