Research Update (October 27, 2015) - The CSA Research Team is ready to regroup and rebound after concluding a successful CSA Congress US in Las Vegas. This month in the Research Update, we'll recap CSA Congress, highlight recent deliverables and recognize the 2015 Ron Knode Award Winners.
The CSA Research Team is ready to regroup and rebound after concluding a successful CSA Congress US in Las Vegas. This month in the Research Update, we'll recap CSA Congress, highlight recent deliverables and recognize the 2015 Ron Knode Award Winners.
Stay up to date with our latest research projects.
Last week, the CSA Congress and IAPP Privacy Academy teamed up in Las Vegas, Nevada for the Privacy.Security.Risk. (PSR) conference. This was the second privacy and security conference that the CSA and the IAPP co-hosted and the conference was a successful event with cloud security and privacy professionals learning about best practices, the current state of affairs in their respective fields, and cross-training and learning new disciplines. During CSA Congress at PSR, there were a number of releases, events, awards, speakers, and sessions that ran the gamut of the CSA’s Research Portfolio.
The Cloud Security Alliance announced the recipients of its fourth annual Ron Knode Service Award, recognizing six members from the Americas, Asia-Pacific and EMEA regions for their excellence in volunteerism. The honorees were selected by the CSA executive team and chosen based on their valuable contributions towards fulfilling CSA’s mission of promoting best practices to help ensure security in cloud computing and next-generation IT. This year’s recipients were honored at the CSA Congress 2015 & IAPP Privacy Academy 2015.
I would like to thank my friends at Code42 for again giving me a platform to talk about the cloud security issues on my mind. In this blog post, I wanted to discuss some of the changes I am seeing in how security professionals are rethinking best practices as a result of being exposed to cloud computing and what some of the security priorities are as organizations begin to depend upon a critical mass of cloud services.
The Internet of Things (IoT) has been experiencing massive growth in both consumer and business environments. In response to this emerging market and the particular security requirements of these connected devices, The CSA established the IoT Working Group to focus on providing relevant guidance to its stakeholders who are implementing IoT solutions.
The CSA's Quantum-Safe Security Working Group released “What is Post-Quantum Cryptography,” a report that takes a closer look at post-quantum cryptography and what institutions need to know and need to do in order to protect themselves against quantum computers.
The Cloud Security Alliance teamed up with Palo Alto Networks to produce a new whitepaper titled, “Security Considerations for Private vs. Public Clouds.” A public cloud deployment occurs when a cloud’s entire infrastructure is owned, operated and physically housed by an independent Cloud Service Provider. A private cloud deployment consists of a cloud’s entire infrastructure owned, operated and physically housed by the tenant business itself, generally managed by its own IT infrastructure organization.