CSA Monthly Newsletter (March 16, 2016) - CSA Summit San Francisco 2016 has concluded with an array of announcements and releases from the Cloud Security Alliance. This month’s newsletter features exciting news from the highly successful event. Read on to learn about other CSA Events and CloudBytes™ sessions upcoming.
CSA Summit San Francisco 2016 has concluded with an array of announcements and releases from the Cloud Security Alliance. This month’s newsletter features exciting news from the highly successful event. Read on to learn about other CSA Events and CloudBytes™ sessions upcoming.
Stay up to date with our latest research projects.
The Cloud Security Alliance (CSA) today announced the establishment of the CSA Research Fellowship Program designation, the highest honor and distinction awarded to a CSA Research Volunteer who has demonstrated significant contributions to CSA Research. The honor aims to recognize the talented and dedicated efforts of select CSA Research Volunteers whose work has led to groundbreaking and forward-thinking advancements of the CSA.
The CSA's Software Defined Perimeter research project announced it will hold its fourth Hackathon at the RSA Conference 2016 in San Francisco, to continue to test the CSA Software Defined Perimeter Specification V.1. A top prize of $10,000 is available to the first participant to either access or disrupt a cloud-based mission critical application.
Cloud Security Expo is the first event of its kind in the UK, and is your only destination to meet the world’s leading suppliers to the cloud security sector, hear from the industry’s leading practitioners with CPE credits and network with thousands of your peers from across the cloud technology sector.
A world-class program of speakers and panelists will provide perspectives on the Federal cloud computing strategy, civilian and defense agency cloud security standards, and real-world implementation experience with state-of-the-art cloud security architectures.
Learn how a comprehensive cloud data protection solution will allow you to meet your data protection and compliance requirements across your private, public and hybrid cloud environments. You’ll find ways to centralize your security controls to efficiently and effectively implement the data security solution to fit your business operational needs consistently in a multi-cloud environment.
The demand for business to be more agile to meet customer demands and stay competitive is driving a change in the way applications are developed, deployed, and adopted. This webinar will cover visibility, threat prevention, automation, and centralized management.
“The Treacherous 12 – Cloud Computing Top Threats in 2016” plays a crucial role in the CSA research ecosystem. The purpose of the report is to provide organizations with an up-to-date, expert-informed understanding of cloud security concerns in order to make educated risk-management decisions regarding cloud adoption strategies.
This white paper discusses some of the potential security issues and concerns, and offers guidance for securing a Virtual Network Function (NFV) based architecture, whereby security services are provisioned in the form of Virtual Network Functions (VNFs).