CSA Monthly Newsletter (June 28, 2016) - Summer has officially arrived and the CSA Research team has been busy with CloudBytes, surveys, and project initiatives for June. Get involved with the CSA and read this month's newsletter for the latest in CSA Research.
Summer has officially arrived and the CSA Research team has been busy with CloudBytes, surveys, and project initiatives for June. Get involved with the CSA and read this month's newsletter for the latest in CSA Research.
Stay up to date with our latest research projects.
Current state of SaaS security – with several years of cloud adoption in many organizations, approaches to security have been evolving rapidly. The purpose of this survey is to look at the specific concerns, policies, and controls that enterprises are using.
The Cloud Security Alliance would like to invite you to review and comment on the Big Data working group’s latest document, Big Data Security and Privacy Handbook: 100 Best Practices in Big Data Security and Privacy. This document lists out in detail the best practices that should be followed by big data service providers to fortify their infrastructures.
Innovative since Day 1, P.S.R. brings together two related fields—privacy and security—helping you see beyond your role in order to excel in your role. Because perspective is everything. Delivering the most thought-provoking speakers, sessions led by foremost experts and invaluable opportunities to connect and share ideas, P.S.R. gives you a world of new perspective. Don’t miss it.
The Cloud Security Alliance EMEA Congress is Europe’s premier cloud security event and is designed around the CSA’s core mission of promoting the use of best practices for providing security assurance within Cloud Computing and to provide education on the uses of Cloud Computing to help secure all other forms of computing.
Internet of Things will lead to a future where virtually every physical item has a microprocessor and all industries will be disrupted. In this presentation, CSA CEO Jim Reavis discusses key security trends for Internet of Things and Cloud Computing.
Enabling secure BYOD has long been a challenge for IT. Attempts to secure these devices with agents and device management tools like MDM have been met with widespread employee concerns about privacy and usability, and as a result, organizations see low rates of adoption.
Changed business practices, such as employees working on the move and the adoption of the cloud and cloud resources, should be mirrored by a change in security strategies. Organizations are commonly reluctant to adopt cloud technologies over concerns with security and control over enterprise data.
In this report from CSA’s Quantum-Safe Security Working Group, Quantum Random Number Generators will go over the impacts of randomness on security. For security or other applications where high quality randomness is needed, physical approaches are taken to generate random bits.
Data Center is a critical infrastructure for Cloud Computing. The Cloud Data Center Security working group aims to develop a security guidance document for Data Center providers and customers worldwide, focusing mainly on physical security requirements of the facility and operational best practices.
This paper seeks to view the cloud computing industry through the lens of the enterprise information security practitioner. By articulating the state of cloud security from this viewpoint, we can better understand the gaps and solutions we must advocate for and help cloud providers better understand the needs of their consumers.