CSA Monthly Newsletter (April 19, 2016) - Spring has sprung and with the change in seasons, the CSA Research team continues moving forward with projects, surveys, initiatives, and CloudBytes. Read on in this month's newsletter for the latest in CSA Research.
Spring has sprung and with the change in seasons, the CSA Research team continues moving forward with projects, surveys, initiatives, and CloudBytes. Read on in this month's newsletter for the latest in CSA Research.
Stay up to date with our latest research projects.
The Cloud Security Alliance (CSA) released The Software Defined Perimeter (SDP) Hackathon #4 Report: High Availability Public Cloud Research. The report is based on the findings and key learnings from the fourth annual Hackathon held by CSA’s SDP Working Group during the RSA Conference 2016 held last month in San Francisco.
The Cloud Security Alliance released the CSA STAR Program & Open Certification Framework in 2016 and Beyond, a new whitepaper that has been created to provide the security community with a description of some of the key security certification challenges and how the CSA intends to address them moving forward.
The purpose of this survey and research is to uncover; The extent of employees leaking critical information and tradecraft on illicit sites, Data types and formats being exfiltrated along with exfiltration mechanisms, Why so many of these threats go undetected, What happens to the data after it has been exfiltrated, and more.
A world-class program of speakers and panelists will provide perspectives on the Federal cloud computing strategy, civilian and defense agency cloud security standards, and real-world implementation experience with state-of-the-art cloud security architectures.
SecureCloud is the only European conference focussed exclusively on cloud security. It aims to provide an opportunity for government experts, industry experts, and corporate decision makers to discuss and exchange ideas about how to shape the future of cloud computing security.
The demand for business to be more agile to meet customer demands and stay competitive is driving a change in the way applications are developed, deployed, and adopted. This webinar will cover visibility, threat prevention, automation, and centralized management.
Throwing a safety net over mobile cloud app usage leaves the enterprise having to balance manageability and security against the user experience. This session covers how you can gain visibility into mobile cloud app usage, defend against malware and threats, and enforce corporate policies for mobile—all while enabling BYOD and protecting the user experience.
Join CSA CEO, Jim Reavis and Okta CISO, David Baker, for a discussion on the top threats organizations face, how the landscape is changing and best practices for improving the security of your organization.
“The Treacherous 12 – Cloud Computing Top Threats in 2016” plays a crucial role in the CSA research ecosystem. The purpose of the report is to provide organizations with an up-to-date, expert-informed understanding of cloud security concerns in order to make educated risk-management decisions regarding cloud adoption strategies.
In order to improve the understanding of Security as a Service and accelerate market acceptance, clear categorization and definitions of these services is necessary. This document provides a high overview of the business and technical elements needed to evaluate the risks associated with the category of Continuous Monitoring.