Press Coverage

PC Magazine | September 07, 2016

10 Best Practices for Securing Big Data

Security Info Watch | September 06, 2016

Addressing Cloud Risk

Channel Insider | August 30, 2016

10 Best Practices for Security, Compliance Monitoring

ComputerWorld Australia | August 27, 2016

100 best practices for keeping big data secure

CIO Insight | August 26, 2016

Security Concerns of Next-Generation Analytics

InformationWeek | August 23, 2016

8 Steps To Building A Successful Cyber-Security Career

Talkin Cloud | August 15, 2016

Sage Investigates Internal Data Breach

Cloud Security Resource | August 15, 2016

Security Experts Differ on Government Cooperation

Channel e2e | August 15, 2016

5 Channel Partner Updates: 15 August 2016

Channelnomics | August 12, 2016

Today’s channel rundown – 12 August 2016

IT Pro Portal | August 09, 2016

Separating fact from fiction in the cloud

Gov Info Security | July 28, 2016

Ransom Smackdown: Group Promises Decryption Tools

InformationWeek | July 06, 2016

IT Skills Gap Hurts Enterprise Security: Survey

IT Pro Portal | July 04, 2016

Quantum Random Number Generators Explained

Cloud Security Resource | June 28, 2016

Taking a Quantum Leap to Assure Strong Encryption

Converge! Network Digest | June 27, 2016

Quantum Random Number Generators for Better Encryption

Cloud Security Resource | June 20, 2016

It’s Time to Secure that Cloud…but What Skills Do You Need?

MSP Mentor | June 17, 2016

Cloud 101: Setting Customer Expectations

InfoSecurity Magazine | June 14, 2016

Ransomware Tunes into Smart TVs

Network World | June 01, 2016

Software-defined Perimeter (SDP) Essentials

Security Intelligance | May 27, 2016

2016 Security Conferences: Infosecurity Europe

Computer News Middle East | May 23, 2016

eHDF enhances its Public Cloud portal

Security Brief | May 18, 2016

Waikato University takes on Kiwi cyber security

Information Management | May 03, 2016

Love Affairs with the Cloud Obscure Many Security Risks

Information Management | April 27, 2016

Great Imposters Still a Leading Cause of Data Breaches

Computer World | April 26, 2016

5 steps to simple role-based access control

ZDNet | April 20, 2016

Confidence in cloud security

Computer Business Review | April 18, 2016

Why security is still the number one problem for cloud

InformationWeek | April 18, 2016

Cloud Stampede Is On, But Who’s Watching Security?

SearchNetworking.com | April 14, 2016

Enterprises stick with private cloud systems

Wha Tech | April 12, 2016

The rise of shadow IT

Cloud Tweaks | March 30, 2016

INSIDER THREATS AND SENSITIVE DATA IN THE CLOUD

Computer Business Review | March 29, 2016

Clouds lifting: a brighter public sector security outlook ahead?

Information Management | March 28, 2016

The 12 Top Treacherous Cloud Computing Threats

Security Intelligence | March 22, 2016

Security Challenges With the Virtual Network: Part II

SiliconANGLE | March 09, 2016

Cloud security becomes a boardroom issue

Gov Info Security | March 07, 2016

Ransomware Grows More Targeted

Government Technology | March 06, 2016

Security Trends From RSA Conferences

CIO Review | March 05, 2016

What to Look For in the Cloud During 2016

Cloud Security Resource | March 03, 2016

CSA Identifies 12 Major Threats to Cloud Computing Security

ComputerWeekly | March 02, 2016

CSA outlines CIOs’ top 12 cloud security concern

Search Cloud Security | March 02, 2016

Redundant cloud security controls creating headaches

Baseline | March 02, 2016

How Clouds Are Reshaping Business and IT

Network Computing | March 01, 2016

NFV Security Risks Identified

Search Cloud Security | March 01, 2016

Cloud providers weigh in on iPhone backdoor debate

The New Stack | March 01, 2016

RSA 2016: There Is No Cloud Security Stack Yet

Converge! Network Digest | February 29, 2016

Top Twelve Cloud Computing Threats

Search Cloud Security | February 29, 2016

Cloud malware leads to high-speed impact

Network World | February 29, 2016

RSA Conference 2016: Day 1

eSecurity Planet | February 29, 2016

Cloud Security Alliance Takes Aim at Next Generation Cloud

Go Certify | February 27, 2016

CertMag Reveals List of 50 Hot Certs for 2016

Business Reporter UK | February 26, 2016

Firms must stay secure as threat to the cloud grows

CSO Online | February 25, 2016

Ransomware rising

Cloud Security Resource | February 22, 2016

The Numbers Show: Being Certified in IT Really Makes a Difference

Bloomberg BNA | February 18, 2016

Perspective: The Legal Ethics of Using the Cloud

Talkin Cloud | February 03, 2016

7 Tips for Offering Cloud Storage Services to SMBs

Channel Biz UK | February 01, 2016

Focus: Data security in a hybrid cloud

Dark Reading | January 29, 2016

Cloud Security: It’s Become A People Problem

Sramana Mitra on Strategy | January 28, 2016

2016 IPO Prospects: Okta Prepares to Reveal Public Identity

Talkin Cloud | January 27, 2016

7 Must-Read Cloud Stories for CSPs, Jan. 2016

Talkin Cloud | January 27, 2016

Veeam Boasts Record 2015 Enterprise Cloud Sales

InformationWeek | January 25, 2016

65% Say Cloud As Secure As On-Premises

InfoSecurity Magazine | January 25, 2016

Top Ten Big Data Security and Privacy Challenges

CloudWedge | January 24, 2016

Could the Cloud Be More Secure than On-Premises?

Talkin Cloud | January 22, 2016

CSA: IT Perception of Cloud Services Has Increased

PC Magazine | January 22, 2016

7 Ways Business Clouds are Evolving in 2016

SmartGridNews | January 19, 2016

Security Survey: The cloud is not a force to fear

Information Management | January 15, 2016

Fears Over Data Security In the Cloud Easing, Says Study

InfoSecurity Magazine | January 13, 2016

Business Confidence in Cloud Security Grows

IT Pro Portal | January 13, 2016

Security: The reason to move to the cloud

Gov Info Security | January 06, 2016

Tracking Cloud Services: An Essential Security Step

Networks Asia | December 18, 2015

Cloud federation – simplifying access control

SYS-CON | December 14, 2015

End User Control of IoT Data

Microfinance Monitor | December 14, 2015

PES University Opens Country’s Cyber Defense Research Centre

IT Pro Portal | December 14, 2015

How to securely embrace shadow IT in the enterprise

CloudTweaks News | December 09, 2015

PRINCIPLES FOR DATA PROTECTION IN THE CLOUD IN 2016

Asia Cloud Forum | December 08, 2015

Five security must-dos for first time cloud users

Cloud Security Resource | December 08, 2015

CSA Guidance V.4: Domain 1 Ready for Review and Comments

The Telegraph | December 03, 2015

Top 10 cybersecurity must-dos

Compliance Week | November 23, 2015

Cloud Security Is a Challenge for Users and Providers

Tech News World | November 23, 2015

New Tech Targets Enterprise Ransomware

InfoSecurity Magazine | November 18, 2015

Smart Cities Cybersecurity Guidelines Focus on Technology Choices

Network World | November 11, 2015

11 top IaaS cloud computing certifications

BankInfoSecurity.com | October 28, 2015

Improving Cyber Risk Management

Business Solutions Magazine | October 21, 2015

Skyhigh Networks Registry Eliminates CSP Comparison Guesswork

Wha Tech | October 19, 2015

In search of cloud governance

Solutions Review | October 16, 2015

This Week’s Top Identity Management News: 10/16

Cloud Tweaks | October 15, 2015

The Importance of Practical Experience

Vmblog | October 13, 2015

Centrify Joins Cloud Security Alliance

Bank Info Security | October 12, 2015

Amazon Downplays Cloud Breach Threat

Information Security Buzz | October 12, 2015

Identity and Access Management for the Internet of Things

SecurityWatch NZ | October 06, 2015

Acronis looks to roll out quantum encryption solutions

CIOL | October 05, 2015

4 IAM best practices for IoT

Solutions Review | October 02, 2015

This Weeks Top Identity Management News 10/02

SearchCloudSecurity.com | October 01, 2015

Experts: It’s time to rethink cloud data privacy protection

The Nation | September 29, 2015

INET to build third data centre

V3 Integrated Marketing Blog | September 29, 2015

Looking at Hybrid Cloud and Security? Welcome to the Matrix

Business 2 Community | September 29, 2015

3 Ways Remote Workers Are Changing Technology

Channel EMEA | September 28, 2015

eHosting DataFort Achieve the CSA STAR Certification

The Stack | September 21, 2015

Making data protection “business consumable”

Havard Business Review | September 18, 2015

What Do You Do When Employees Start Using a Free Cloud Service?

Computerworld | September 16, 2015

How safe and secure is open-source OpenStack?

No Jitter | September 11, 2015

Are You Sitting on a Cloud-Based House of Cards?

WindowSecurity.com | September 08, 2015

Microsoft Ignites a new Focus on Security (Part 3)

Cloud Search Provider | September 04, 2015

Data security: In cloud computing environments, partners bulk up

Dark Reading | September 03, 2015

RSA’s Ex-CEO Coviello Back In The Game

eSecurity Planet | September 01, 2015

5 Ways to Make Public Cloud More Secure

Voice of America | September 01, 2015

Who Can Afford the Right to Be Forgotten by Google?

Federal News Radio | August 31, 2015

Software Defined Perimeters

IoT Evolution World (blog) | August 24, 2015

Ensuring Security When You No Longer Own the Network

Channel Partners | August 19, 2015

What Should Really Worry You About Cloud

ZDNet Asia By the Way Blog | August 19, 2015

Alibaba setting up cloud datacentre, international HQ in Singapore

Tech Republic | August 18, 2015

Cloud security: 10 things you need to know

Database Trends and Applications | August 18, 2015

Cloud Is Changing the IT Landscape – Q&A with VMware’s Mathew Lodge

Joe McKendrick Blog | August 18, 2015

With Cloud Computing, Managing Expectations Is Everything

Information Security Buzz | August 03, 2015

Three Common Cloud Myths that keep Financial Firms in Fear

Bank Info Security | July 29, 2015

Cloud Security: Lessons Learned

Computerworld New Zealand | July 20, 2015

University of Waikato honoured as NZ cyber security expert

Scoop Education | July 16, 2015

Award for cyber security head

Help Net Security | July 14, 2015

CFOs are not confident about their level of security

Channel Partners Online | July 13, 2015

Bring Your Own Cloud’ Leads To Chaos, Inefficiency

UNIX as a Second Language | July 13, 2015

With My Head in the Clouds: Preparing for the CCSK

Information Age | July 03, 2015

How heavily regulated industries can embrace cloud

Dark Reading | July 01, 2015

Smart Cities’ 4 Biggest Security Challenges

Channel Insider | July 01, 2015

WestconGroup Launches Tech Incubation Program

Dell Powermore | June 30, 2015

Perspectives on cloud and security

Programmable Web | June 29, 2015

CSA CREATES OPEN CLOUD SECURITY API WORKING GROUP

Search Cloud Computing | June 09, 2015

Four cloud security myths debunked

Gov Info Security | June 04, 2015

Busting the Beebone Botnet

Information Security Buzz | June 01, 2015

Publishing Healthcare App Guidance for Developers

Smart Data Collective | June 01, 2015

Safe Big Data

Computerworld Australia | May 19, 2015

Top 9 cloud computing threats

SecurityWeek | May 18, 2015

Oracle Issues VENOM Security Updates

The CIO Report | May 18, 2015

How AT&T Is Virtualizing Security

Backup Technology | May 13, 2015

THE ROLE OF CLOUD BROKERS IN THE CLOUD

Network Computing | May 07, 2015

Top 11 Virtualization Risks Identified

Federal Computer Week | May 05, 2015

Make the cloud fit like a nice suit

Cloud Tweaks | May 04, 2015

New Cloud Security Certification

SC Magazine | April 27, 2015

CSA, (ISC)²® create new cloud certification

Information Age | April 27, 2015

The FAQ of hacktivist attacks: what you need to know

The 1to1 Blog | April 27, 2015

3 Tips for Cloud Migration

Bank Info Security | April 24, 2015

Cloud Security Certification Launched

Salted Hash | April 22, 2015

RSAC 2015: RSA Conference (Day 3)

Infosecurity Magazine | April 22, 2015

#RSAC: (ISC)2 and CSA Partner to Launch New Credential

Petri IT Knowledgebase | April 22, 2015

2015 CSA Summit Highlights Cloud Security Threats

SearchCloudSecurity.com | April 21, 2015

CSA, ICS2 introduce new cloud security certification

Government Technology | April 10, 2015

5 Ways to Reduce Data Loss in the Cloud

Info Security | April 07, 2015

CSA to Dole Out $10K Prize at Hackathon

Security Week | April 06, 2015

Security Reviews Critical to Cloud Migration

Dark Reading | March 27, 2015

Black Hat USA 2015: Defensive Bonus +3

Risk & Compliance Journal/WSJ Blog | March 27, 2015

Survey Roundup: Unprepared for Disaster

Cloud Computing Intelligence | March 26, 2015

Cloud based IT opportunities for the financial services

Info Security | March 25, 2015

Center for Internet Security Aims at AWS

FierceITSecurity | March 24, 2015

Coca-Cola adopts new approach to network security

Banking Exchange | March 17, 2015

Global financial firms have heads in “clouds”

Credit Union Times | March 15, 2015

Cloud Security a Concern in Financial Sector: Survey

Businesscloud9 | March 09, 2015

Financial firms searching for cloud strategy

Businesscloud9 | March 09, 2015

EU States gets cyber security guidance

Business Cloud News | March 06, 2015

Financial services firms still cagey about cloud computing

Baseline | February 20, 2015

Is Shadow IT Holding Back Cloud Adoption?

Midsize Insider | February 19, 2015

MSPs Can Help Thwart Shadow Cloud Threats

Search Cloud Security | February 17, 2015

Top considerations for choosing a cloud provider

MSPMentor | February 02, 2015

‘Shadow Cloud’ Threatens Enterprise Security

Search Cloud Computing | January 23, 2015

Choose a cloud governance flavor for your IT taste buds

Search Cloud Computing | January 22, 2015

Overcome the most feared cloud security issues in 2015

IT Trends & Analysis | January 20, 2015

Cisco Survey: You Can’t Fix… Security

Information Age | January 15, 2015

Should the board steer cloud projects?

Information Management | January 14, 2015

Cloud Security Concerns Shift From IT to Boardroom

Business News Daily | January 13, 2015

Businesses Still Wary of Cloud Technologies

Channel Pro | January 12, 2015

Cloud survey: Firms in dark on Shadow IT

BetaNews | January 12, 2015

Cloud security becomes a boardroom concern

CSO Online | January 12, 2015

Only 8 percent of companies can track shadow IT

IT World Canada | January 12, 2015

Security still a barrier to cloud: Survey

Politico | January 12, 2015

Report Watch

TechTarget UK | January 09, 2015

Shadow IT worries clouding hosted moves

Associations Now | January 09, 2015

SURVEY: “SHADOW IT” BECOMING A TOP-LEVEL PROBLEM

CMS Wire | January 09, 2015

Could Cloud Apps Make the Enterprise Sick?

Channel Partners | January 09, 2015

HOW TO HELP CLIENTS IDENTIFY, DEAL WITH ‘SHADOW IT’

InfoSecurity Magazine | January 09, 2015

CSA: Cloud Security Finally Piques Exec Interest

MicroScope | January 09, 2015

Shadow IT worries clouding hosted moves

Computer Business Review | January 09, 2015

COMPANIES ARE IN THE DARK ON SHADOW IT USAGE

Business 2 Community | December 17, 2014

Hey, You, Get Off of My Cloud! Cloud Security Basics

Datacenter Dynamics | December 12, 2014

IT Infrastructure Continues March Into The Cloud

Business Solutions Magazine | December 11, 2014

How To Address The Growing Need For New Data Security Solutions

[ci]channelinsider | December 04, 2014

How Cloud Adoption, Challenges Are Taking Shape

SearchHealthIT | November 18, 2014

Must-knows about cloud computing in healthcare

The Register | November 14, 2014

Make sure big data doesn’t land you in big trouble

Redmond Magazine | September 26, 2014

Survey Finds IT Pros Underestimating Cloud-Based App Usage

Search Cloud Security | September 24, 2014

Cloud security experts call for global data privacy standards

Dark Reading | September 24, 2014

Bash Bug May Be Worse Than Heartbleed

Search Cloud Security | September 23, 2014

Experts: Expect cloud breaches to endanger data privacy

Computer Dealer News | September 16, 2014

There is a cloud apps disconnect in the market

TechNews World | September 16, 2014

Web-Surfing Adults More Infection-Prone Than Teens

Help Net Security | September 15, 2014

Emerging cloud threats and how to address them

ECT News Network | September 10, 2014

IBM Enlists Intel to Shore Up Hybrid Cloud

FierceCIO | September 04, 2014

Shining a light on shadow IT

CRN - UK | September 04, 2014

Star exposure no joke for cloud providers

Dark Reading | September 04, 2014

In Cloud We Trust: A New Model

TechRadar UK | September 03, 2014

Cloud security: how to keep your data safe

The Globe and Mail | September 02, 2014

The iCloud hack can’t kill cloud computing

SC Magazine | September 02, 2014

Cloud in an information world

Search Cloud Security | July 18, 2014

CSA releases new Cloud Controls Matrix and CAIQ standards

Network Computing | June 11, 2014

Chris Hoff Talks SDN, Security & More

FedTech Magazine | May 28, 2014

Is FedRAMP the Final Answer?

Smart Data Collective | May 05, 2014

Cyber Security: How to Cover Your SaaS

Property Casualty 360 | March 25, 2014

Comfort in the Cloud

Information Week | March 03, 2014

9 Worst Cloud Security Threats

Government Health IT | February 14, 2014

5 cloud security lessons

Tech News World | January 09, 2014

All Eyes May Be on Security in Samsung’s S5

Midsize Insider | December 16, 2013

IT Security Teams Enable Business

Cloud Tweaks | December 13, 2013

“5 Cloud Security Predictions For 2014 “

GCN | December 13, 2013

“Locking down cloud applications “

Global Post | December 06, 2013

Building walls in the cloud

Midsize Insider | December 05, 2013

Big Data Challenge: Encryption

InformationSecurity | December 04, 2013

CSA Congress 2013: Cloud Is Not Only Cheaper But More Secure

ComputerWeekly | November 28, 2013

SME cloud – blanket security or security blanket?

InformationWeek | November 26, 2013

NSA Surveillance: First Prism, Now Muscled Out Of Cloud

Network Computing | November 21, 2013

Cloud Security Alliance Launches Secure Network Effort

SearchCloudApplications | November 13, 2013

Industry group announces plans to address cloud security challenges

Dark Reading | November 13, 2013

Services Offer Visibility Into Cloud Blind Spot

Computer World | November 07, 2013

Another NSA strike against USA tech biz

Information Security Buzz | November 07, 2013

CSA Sets Research Agenda for Annual Congress

Security Dark Reading | October 18, 2013

CSA Releases Expanded Cloud Controls In New CCM V.3

Infosecurity | October 12, 2013

Public WiFi Hotspots Ripe for MITM Attacks

ARN | October 02, 2013

BSI targets Cloudy service providers

Datamation | September 30, 2013

Will the Snowden Leaks Hurt U.S. Cloud Providers?

Information Week | September 23, 2013

The state of Cloud Security, Risks & Standards

SC Magazine | September 21, 2013

Protecting one’s data in the cloud, post Snowden

Rome Sentinel | September 14, 2013

Dark clouds for business

Information Week | September 14, 2013

The NSA And Your Cloud Data: Navigating The Noise

Computer World | August 26, 2013

Fear of NSA snooping could hurt U.S. cloud vendors

TechWorld | August 23, 2013

Creating your first cloud policy

The Morning Call | August 16, 2013

How the NSA surveillance state hurts the tech sector

Application Development Trends | August 15, 2013

Cloud Security Alliance’s Call for Gov. Surveillance Transparency

Money News | August 14, 2013

Desperate Obama Not Helping Tech Leaders

The Wall Street Journal | August 08, 2013

Cutting CIOs Out of Cyber Insurance Decisions is a ‘Bad Idea’

Computer World | August 02, 2013

U.S. cloud firms face backlash from NSA spy programs

Fierce Enterprise Communications | July 25, 2013

NSA revelations taking toll on ISP market

The Register | July 25, 2013

World+Dog hates PRISM: Cloud Security Alliance

PC Advisor | July 25, 2013

The NSA damages US tech biz overseas

It Knowledge Exchange | July 25, 2013

PRISM scares off would-be cloud users outside the U.S.

The Register | July 25, 2013

World+Dog hates PRISM: Cloud Security Alliance

Network Computing | July 22, 2013

Top IaaS Security Requirements To Consider

Midsize Insider | July 22, 2013

Study: Cloud Computing Security Still Immature

Trusworthy Computing | July 08, 2013

Cloud Security Best Practices and Recommended Resources

Cloud Times | July 08, 2013

Ponemon Report: Cloud Adoption Still Immature

Federal News Radio | June 26, 2013

In Depth Show Blog – June 26, 2013

Search Cloud Applications | June 17, 2013

Cloud data security: Share the responsibility, minimize the risks

Fierce Government IT | June 17, 2013

NIST outlines cloud security management overlay

ISSA | June 15, 2013

Phoenix Cloud Security Forum

Search Cloud Applications | June 14, 2013

Cloud data security: Customers and providers share responsibility

TechEye | June 14, 2013

UK messed up on cloud perceptions

Search Cloud Applications | June 12, 2013

Cloud data security: Use a third party or do the job yourself?

Search Cloud Security | June 12, 2013

Cloud data breach notification: Defining legal obligations

Information Week | June 11, 2013

Microsoft: SMB Cloud Security Worries Easing

Information Week | June 11, 2013

Microsoft: SMB Cloud Security Worries Easing

SYS-CON MEDIA | June 09, 2013

The Transition to the Cloud

The Nation | May 28, 2013

Govt pushing its agencies into the cloud

The Hindu Business Line | May 26, 2013

Foolproofing service standards

Bank Info Security | April 29, 2013

Top Threats are Homegrown

The Connectivist | April 08, 2013

Ermahgerd, This Could Have Been Private!

ReadWrite Enterprises | March 04, 2013

The 9 Top Threats Facing Cloud Computing

Siliconindia | March 04, 2013

9 Notorious Threats to Cloud Computing Security

Enterprise Communications | February 26, 2013

Companies fear of legal and government intervention slows cloud adoption

Dark Reading | February 26, 2013

Cloud Security Falls Short … But Could Be Great

Infoworld | February 25, 2013

9 top threats to cloud computing security

Computer World | February 25, 2013

RSA 2013: Weatherford outlines ‘cyber 9-1-1’ plan

Computing co uk | February 19, 2013

Special report: Cloud 2.0 begins to take shape

Dark Reading | February 13, 2013

Cloud Security Measures Too Opaque For Customers

Information Week | January 23, 2013

Cloud Standards: Bottom Up, Not Top Down

Cloud Times | January 23, 2013

Cloud Security Alliance Summit 2013 at RSA

Data Protection | January 02, 2013

Growing confidence in cloud security

Virtualization Review | December 11, 2012

Cloud Alliance Fights to Secure the Ether

Virtualization Review | December 11, 2012

Cloud Alliance Fights to Secure the Ether

Computer World | December 10, 2012

12 useful websites for IT security

Virtualization Review | December 05, 2012

Cloud Security Alliance Lays Out Mobile Device Guidance

Virtualization Review | December 05, 2012

Cloud Security Alliance Lays Out Mobile Device Guidance

Info Security | December 05, 2012

Finding Safety in the Cloud

Search Cloud Security | November 30, 2012

AWS cloud security model relies on shared security partnership

Midsize Insider | November 30, 2012

Guidelines for Mobile Computing

Backup Technology | November 28, 2012

Will Cloud Computing Become a Regulated Industry?

Midsize Insider | November 21, 2012

Cloud Security Not the Barrier It’s Supposed to Be

Bostlnno | November 21, 2012

Study Hints at the Future of Cloud Computing

Search Cloud Security | November 21, 2012

Cloud security begins with the contract, says expert

Data Center Journal | November 07, 2012

How Secure Is Your Data Center Network?

Search Cloud Security | November 07, 2012

Mobile impacting cloud security issues, says panel

HPC in the Cloud | October 30, 2012

Cloud Security Alliance Releases SIEM Guidance Report

Unified Communications Strategies | October 25, 2012

The Cloud under Threat; the Top Three Enemies

Bank Info Security | October 16, 2012

The ‘Evil 8’ Threats to Mobile Computing

Search Cloud Security | October 12, 2012

Security Warrior for Cloud Transparency

CloudTech | October 09, 2012

What are the current trends in cloud adoption?

CIO | October 09, 2012

Reasons Cloud is a Seller’s Market

Cloud Times | October 06, 2012

Top 10 Cloud Concerns – Study

Help Net Security | October 05, 2012

Cloud Security Alliance outlines top mobile threats

Gov Info Security | October 04, 2012

Addressing Big Data Security, Privacy

InfoWorld | October 02, 2012

Buyers say the cloud is already tired out

Cloud Tweaks | September 27, 2012

Cloud Infographic: The Rise Of The Cloud

IT Business Edge | September 27, 2012

Top 10 Issues Eroding Cloud Confidence

Cloud Computing Exchange | September 27, 2012

Lingering Barriers to Cloud Confidence

Betanews | September 24, 2012

10 issues that erode cloud confidence

Bank Info Security | September 12, 2012

Cloud Compliance Catch-22

Centerbeam | September 10, 2012

CIOs should see opportunity in technology

Simply Security | September 07, 2012

CLOUD SECURITY ALLIANCE SETS SIGHTS ON PRIVACY, BIG DATA

Datacenter Dynamics | September 07, 2012

Cloud computing roundup: Latest global news

Information Week | September 04, 2012

Big Data Working Group To Tackle Security

Hacking Expose | August 31, 2012

Cloud Security Alliance tackles big data security

Search Cloud Security | August 31, 2012

Cloud Security Alliance tackles big data security

Enterprise Apps Today | August 31, 2012

Cloud Security Alliance Sets Sights on Big Data Security

Search Cloud Security | August 21, 2012

CSA partners with BSI on cloud security certification program

Information Managment | August 20, 2012

Cloud Agency Details First Vendor Transparency, Standards Check

Macworld | August 16, 2012

The Cloud is here; now secure it

CIO Asia | August 15, 2012

The Cloud is here; now secure it

ZD Net | August 15, 2012

Security mindset must change with cloud

PC Advisor | August 14, 2012

Gartner: Hype could hurt cloud adoption

InfoQ | August 13, 2012

Amazon Registers AWS with CSA STAR

Redmond Mag | July 26, 2012

Amazon Unleashes Its Cloud Security Controls

Info Security | July 26, 2012

Governance in the cloud: an ongoing problem

Search Cloud Security | July 24, 2012

AWS security now documented in CSA STAR

Computing co uk | July 13, 2012

Don’t head down a cloud cul-de-sac

CIOL | July 12, 2012

HP eases cloud transformation

Fierce Content Managment | July 11, 2012

Science community looks to the cloud for big data management

ItWeb Business | July 09, 2012

Mitigating cloud risks

CFO | June 19, 2012

IT Risk: Your Audit Checklist

The Virtualization Practice | June 08, 2012

Cloud Security Alliance: STAR and other Initiatives

Midsize Insider | June 08, 2012

Cloud Computing Risks: What to Watch Out For

Dark Reading | May 29, 2012

Are Your Secrets Safe In The Cloud?

Financial Times | May 23, 2012

Eurozone economy contracts sharply

Help Net Security | May 21, 2012

Cloud Security Alliance announces EMEA congress

Dark Reading | May 14, 2012

Why Some SMBs Still Fear The Cloud

Cloud Tweaks | May 08, 2012

Why Simple Solutions Are Better For The Cloud

eSecurity Planet | April 26, 2012

8 Steps to a Secure Cloud Initiative

Search Cloud Security | April 24, 2012

Countering cloud computing threats: Malicious insiders

Crain's Cleveland Business | April 20, 2012

Compliance and the Cloud

Network World | April 18, 2012

Efforts afoot to advance cloud standards

It World Canada | April 17, 2012

Trend Micro: Cloud demands new security model

Channel Pro | April 10, 2012

HP announces Converged Cloud

Computer World | April 04, 2012

Microsoft details Azure security features

Cloud Pro | March 30, 2012

How secure is your CSP?

Computer World | March 26, 2012

Push your cloud supplier to participate in CSA STAR

Computer World | March 21, 2012

Code aims to end “cloud” truth-bending

Gov Info Security | March 16, 2012

The Quest for Cloud Security

Windows IT Pro | March 16, 2012

Cloud Computing Hiring Demand Surges

SearchSecurity | March 07, 2012

Video: Jim Reavis on Cloud Transparency

Information Security Mag | February 28, 2012

RSA 2012: Former NSA director warns of economic cyberespionage threat

Dark Reading | February 28, 2012

Cloud’s Future Security Depends On Mobile

Telecom Paper | February 28, 2012

CSA, Trend Micro establish Asia Pacific headquarters

TMC Net | February 27, 2012

Workforce Management Featured Article

Cloud Security, Privacy and Reliability... | February 27, 2012

Cloud Security Alliance Summit 2012

Information Managment | February 27, 2012

CSA Focusing On Mobile Computing, Innovation

Network World | February 23, 2012

Gone Fishin’ at RSA Conference

Search Cloud Security | February 16, 2012

Cloud computing security issues on tap at RSA Conference 2012

Search Security | January 27, 2012

Panel debates cloud computing governance issues

Cloud Computing Journal | January 25, 2012

CloudAudit: Cloud Security for Regulated Industries at Cloud Expo

Search Cloud Security | January 20, 2012

Calls for cloud security transparency getting louder

Computer World | January 03, 2012

Best Practices

Tech Journal | December 30, 2011

Dramatic changes ahead for cyber security in 2012

ZD Net | December 19, 2011

One year on

The Agil Admin | December 16, 2011

Cloud Security Is No Oxymoron

Tech Security Today | December 02, 2011

Cloud Security Alliance Puts a STAR Over the Cloud

Search Cloud Security | November 17, 2011

Updated CSA guidance offers tips, advice on cloud-based security

Information Managment | November 16, 2011

Cloud Security Alliance Releases New Guidance

Search Cloud Security | November 16, 2011

Coviello talks about building a trusted cloud, resilient security

FIN Alternatives | November 15, 2011

Heading To The Cloud? A Security Roadmap

Tech News World | November 15, 2011

A Real-World Approach to Improving Security in the Cloud

Computerworld | October 26, 2011

Why physical security matters, even in the cloud

CRN | October 25, 2011

How to Manage Cloud Risk

Forbes | October 25, 2011

Managing Cloud Risks

Computing co uk | October 19, 2011

Interview: McAfee CTO Raj Samani

Search Cloud Security | October 03, 2011

Cloud risk management: CSA on its Cloud Controls Matrix

Gov Info Security | September 26, 2011

10 Realms of Cloud Security Services

It Knowledge Exchange | September 18, 2011

Blue Skies Ahead – A New Paradigm for Cloud Security

The Wall Street Journal | September 16, 2011

Seeking Safety in Clouds

Info Security | August 26, 2011

Five Ways to Achieve Cloud Compliance

CSO Blogs | August 23, 2011

5 Top Trends Redefining CSO Priorities

PCWorld | August 22, 2011

How the Cloud Can Solve Security Problems

Cloud IT Pro | August 16, 2011

New Guidelines For Cloud Security

Information Week | August 11, 2011

Transparency Key To Cloud Security

Information Week | August 10, 2011

Amazon Outage And Cloud Common Sense

Ping Identity | August 10, 2011

CSA focuses best-practice lens on cloud security

Computerworld | August 08, 2011

Cloud Computing: 4 Tips for Regulatory Compliance

E Week | August 05, 2011

Cloud Standards Get Customer Push

Channel Pro | July 20, 2011

ChannelPro Playbook: Cloud Security Services

The Register | July 19, 2011

Cloud changes shape in a crystal ball

Search Cloud Security | July 14, 2011

CSA licenses cloud transparency tool from CSC

Industry Week | July 13, 2011

Cloud Security In A Manufacturing Environment

Dark Reading | July 12, 2011

Have You Heard Of The Patriot Act?

Computer World | July 11, 2011

Big business in big push for cloud standards

Asia Cloud Forum | July 07, 2011

Cloud Security Alliance adopts CloudTrust Protocol

Wall Street & Technology | July 05, 2011

The Rise of Cloud Regulation

Trusted Cloud | July 04, 2011

UK Cloud Alliance Launches To Address SMB Needs

Federal Computer Week | June 22, 2011

Cloud security may be the easiest problem to solve

Network World | June 20, 2011

A new security architecture for the cloud

Data Center Knowledge | June 08, 2011

Open Data Center Alliance Publishes Usage Models

Information Managment | June 06, 2011

Secure Cloud Practices Still Ramping

Bank Info Security | May 11, 2011

Authentication, Cloud & Governance

Search Cloud Security | May 06, 2011

Group to develop cloud computing audit specifications

Gov Info Security | May 03, 2011

The Case for Cloud Security Standards

Windows IT Pro | May 01, 2011

Why the Cloud is Here to Stay

Sys-Con Media | April 29, 2011

Cloud Computing Poised to Escalate

Network World | April 28, 2011

Amazon outage a valuable lesson in cloud security

Sys-Con Media | April 26, 2011

Managing Risk and Compliance in the Cloud

Roan Solutions | April 25, 2011

Cloud Security Alliance Increases IT Security

Windows IT Pro | April 25, 2011

The Federal Government Embraces the Cloud

Network World | April 25, 2011

CSA, ISO partner on cloud security standards

Search Security | March 01, 2011

Cloud computing technologies: transformation time

Washington Technology | February 28, 2011

Cloud security remains a legitimate, though overhyped, concern

YouTube | February 22, 2011

CSA’s Jim Reavis talks summit and roadmap

Cloud Security Alliance | February 20, 2011

Cloud Security Alliance Summit at RSA 2011

Network World | February 15, 2011

Ernst & Young joins Cloud Security Alliance

GCN | February 15, 2011

What’s missing from cloud security

Windows IT Pro | February 15, 2011

RSA Conference and the Cloud Security Alliance Summit

Search Cloud Security | February 15, 2011

White House CIO talks up cloud computing strategy

IT Business Edge | February 14, 2011

Trust: The Key Word in Cloud Security

The Wall Street Journal | February 14, 2011

VCs: The Time To Make Money In Security Has Finally Arrived

Federal News Radio | February 13, 2011

Cloud Security Alliance Summit kicks off Monday

Information Management | January 18, 2011

E.U. Agency Outlines Data Models, Risk Reviews for Cloud

Sys-Con Media | January 14, 2011

Trusted Cloud – Global Connect Program

Private Cloud | January 10, 2011

Cloud Security Alliance plans at RSA Conference 2011

Sys-Con Media | January 09, 2011

Cloud product strategies for telcos

Tom's Hardware | December 22, 2010

How Secure Is The Cloud?

Network Computing | December 20, 2010

CSA Updates Cloud Security Framework

CIO | December 18, 2010

How to check on your cloud provider

Help Net Security | December 17, 2010

Cloud Controls Matrix 1.1 released

Network World | December 16, 2010

Five cloud security trends experts see for 2011

IT Business Edge | December 13, 2010

GRC Comes to the Cloud

Search Security | December 06, 2010

Cloud computing technology: Don’t get left behind

Enterprise Systems | December 06, 2010

Vendor Press Releases

Search Financial Security | December 02, 2010

Cloud computing technologies and financial services

The globe and mail | November 25, 2010

Choosing the right cloud provider

Search Cloud Computing | November 18, 2010

Government regulation looms over cloud security

Information Week | November 17, 2010

Cloud Consortium Releases Security Compliance Tools

IT Business Edge | November 03, 2010

Gaining Transparency into the Cloud

Information Week | October 17, 2010

CloudAudit Now Under Cloud Security Alliance Umbrella

Help Net Security | October 12, 2010

Questions to ask of a cloud provider

Open Security Laboratory | October 11, 2010

Certificate of Cloud Security Knowledge

IT Business Edge | October 11, 2010

Assessing the Risks of Cloud Computing

Uncompiled.com | September 13, 2010

Trusted Computing Group eyes cloud security framework

Construction Cloud Computing | September 13, 2010

Access Management Policies Hold Keys to Minimizing Administrator Risks

Network World | September 13, 2010

Trusted Computing Group eyes cloud security framework

Information Week | September 13, 2010

Cloud Security And Compliance: Clear The Ambiguity

Cloud Journal | September 05, 2010

New Cloud Security Certificate Now Available.

CSO Magazine | September 01, 2010

Ensure Your Move to the Cloud Is Secure

Hosting Publicity | September 01, 2010

Cloud Security Alliance User Certification

Network Computing | August 30, 2010

New Cloud Security Certification Program Launches

NetWork World | August 25, 2010

The 13 things you should know before going cloud

Rational Survivability | August 21, 2010

Hoff’s 5 Rules Of Cloud Security…

The Federal Circle | August 19, 2010

Cloud Computing Leaders & Laggards

Gov Info Security | August 18, 2010

Cloud Computing Leaders & Laggards

ES Enterprise Systems | August 11, 2010

New Certification Targets Cloud Security

HPC in the Cloud | August 09, 2010

Are Private Clouds Truly More Secure Than Public?

Gov Info Security | August 05, 2010

Cloud Computing: The Case for Certification

Bank Info Security | August 05, 2010

Cloud Computing: The Case for Certification

Secure State | August 05, 2010

Moving To The Cloud Primer

Search Cloud Computing | August 02, 2010

Cloud Security Alliance multiple-choice exam easy peasy

Channel Insider | July 28, 2010

A Certificate to Prove You’re Cloud-Worthy

HPC in the Cloud | July 28, 2010

CSA Announces Cloud Security Certification

IT Business Edge | July 28, 2010

How to Get Certified on Cloud Computing Security

Information Week | July 13, 2010

Are you following cloud security standards?

Read Write Enterprise | July 07, 2010

41% of IT Pros Surveyed Admit to Abusing Admin Privileges

Web Security Journal Blog | July 06, 2010

Cloud Is More Secure

Sonian's Cloud Computing Blog | June 28, 2010

The Cloud Security Alliance’s Top Cloud Computing Threat

MIS Training Institute | June 28, 2010

Cloud Security Alliance Congress

Black Hat | June 28, 2010

THE CLOUD SECURITY ALLIANCE SUMMIT

CSO | June 15, 2010

Cloud security: The basics

Network World | June 15, 2010

Cloud security: The basics

Large Enterprise Business | June 12, 2010

The top 7 security threats to cloud computing

The Virtualization Practice | June 09, 2010

To Cloud or not to Cloud, Better Yet, What is a Cloud?

No Jitter Blog | June 09, 2010

Cloud Security, Some Guidance

Computerworld | June 07, 2010

Cloud security: Try these techniques now

Pink Identity | June 07, 2010

CIS Series. Jim Reavis: Securing the cloud

Private Cloud | June 07, 2010

Seven deadly sins of cloud security

Nework World | May 28, 2010

The Dangers of Cloud Computing

Trusted Cloud | May 26, 2010

The Real Problem with SaaS Security

Trusted Cloud | May 25, 2010

Six Misconceptions About Cloud Apps

Defense Industry Daily | May 25, 2010

Head in the Clouds: DoD Turns to Cloud Computing

Security Watch | May 20, 2010

Cloud computing expected to improve security

ZDNet | May 18, 2010

Ottankan Alliance

Investors.com | May 17, 2010

Data In A Cloud? Keep Feet On The Ground

Federal News Radio | May 14, 2010

Survey: Many concerned about security in the cloud

Private Cloud | May 12, 2010

Cloud Computing Poses Control Issues for IT

Rational Survivability | April 30, 2010

You Can’t Secure The Cloud

Cloud Computing Spunje | April 30, 2010

Cloud security’s seven deadly sins

Nemerts Research | April 13, 2010

Feds Addressing Need for Cloud Transparency

Computer World | April 12, 2010

Frustrations with cloud computing mount

Virtualization Journal | April 07, 2010

A Service Auditor’s Letter to the Cloud

Cloud Computing Journal | April 07, 2010

A Service Auditor’s Letter to the Cloud

SearchSecurityChannel.com | April 06, 2010

Q&A: CloudAudit targets automated risk assessment, management

Network World | March 31, 2010

Cloud security’s seven deadly sins

CXO | March 30, 2010

Web security in the cloud

Information Week | March 18, 2010

Let Stormy Session On Cloud Standards Be Your Guide

Channel Web | March 18, 2010

Agencies Push For Cloud Security Standard

Cloud Computing Applications | March 09, 2010

Cloud Security Alliance Calls For Standards, Outlines Threats

Tech News U.S. | March 08, 2010

Cloud Computing’s 7 Deadliest Security Risks

Geek O Pedia | March 08, 2010

Cloud Computing’s 7 Deadliest Security Risks

IT Code News | March 06, 2010

IT News HeadLines (ComputerWeekly)

NETWORK WORLD | March 06, 2010

Newest Security Reports Show Changing Threats

ComputerWeekly.com | March 06, 2010

Cloud Security Challenge

ZD Net Asia | March 02, 2010

Google signs up for Cloud Security Alliance

Information Week | March 01, 2010

RSA: Toward A Trusted Cloud

Security Dark Reading | March 01, 2010

Cloud Security Alliance Names Top 7 Threats To The Cloud

SYS-CON Media | January 08, 2010

Cloud Security Alliance Guidance v2 Released

IndustryWeek | January 08, 2010

Alliance Issues New Guidelines for Cloud Security

CIO Magazine (Au) | January 06, 2010

Is Compliance in the Cloud Possible