RSVP to exciting CloudBytes Webinars in January
Published: 12/15/2015
CloudBytes webinar series is dedicated to educating the public on all things related to the cloud and next generation IT. We have two exciting webinars coming up: Making Trusted Decisions to Use the Cloud: A New Model to Succeed Presenter: Jeffrey Ritter, External Lecturer, University of Ox...
CSA’s Cloud Control Matrix (CCM) Releases Minor Update to Version 3.0.1
Published: 12/11/2015
CSA’s Cloud Control Matrix (CCM) Working Group has released a series of minor updates and corrections to version 3.0.1 of its CCM. These minor updates/corrections were based on feedback from our CCM user community. A tab was created in the spreadsheet titled “CCM Change Log” to capture the de...
CSA Releases CloudTrust Protocol Prototype Source Code
Published: 12/10/2015
Thanks to the support of our peer reviewers and contributors (including the EU projects SPECS, A4Cloud and CUMULUS), CSA is pleased to announce the release of an open-source prototype implementation of the CTP API. The Cloud Trust Protocol (CTP) is designed to be a mechanism by which cloud se...
Cloud Security Alliance Releases Mobile Application Security Testing Initiative
Published: 12/02/2015
White Paper Ready for Peer Review SINGAPORE – December 2, 2015 - The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment, today announced that its Mobile Application S...
Cloud Security Alliance Adds Chinese Universities to the APAC Education Council
Published: 12/02/2015
SINGAPORE – December 2, 2015 - The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment, today announced the launch of the new CSA Asia- Pacific (APAC) Education Council...
Cloud Security Alliance Successfully hosts Cross-Straits Working Level Meeting on Cybersecurity Following Xi-Ma Meeting in Singapore
Published: 12/01/2015
SINGAPORE – December 1, 2015 - On November 7, 2015, Mr Xi Jinping, President of the People's Republic of China (PRC), and Mr Ma Ying-jeou, President of the Republic of China (ROC/Chinese Taipei), met in Singapore. The Xi-Ma meeting held in Singapore has been one of the most significant events ...
Securing Smart Cities Issues Guidelines for Smart City Technology Adoption
Published: 11/18/2015
Securing Smart Cities, the not-for-profit global initiative addressing the cyber security challenges of smart cities, today released guidelines jointly developed by Securing Smart Cities and the Cloud Security Alliance (CSA) for the adoption of smart city technology. The guide provides organiz...
Cloud Security Alliance Summit Los Angeles 2015 To Feature Top Experts from Entertainment and Enterprise on Lessons Learned in Cloud Security
Published: 11/17/2015
Speakers from The Honest Company, PwC, University of Oxford, Microsoft, Google, SpaceX and Evident.io to Be Featured at the Upcoming Inaugural Event Los Angeles, CA – November 17, 2015 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awar...
Upcoming Webinars on Safe Harbor and CASB Capabilities
Published: 11/10/2015
CloudBytes webinar series is dedicated to educating the public on all things related to the cloud and next generation IT. We have two exciting webinars coming up: Can I Still Use the Cloud? Now that Safe Harbor is Dead Presented by Nigel Hawthorn of Skyhigh Nov 24th--6:00am PT (2:00pm GMT) ...
Keep your Data and Applications Safe from CSA Top Threats
Published: 11/04/2015
The cloud presents all kinds of opportunities for today’s enterprise, from anywhere access to anything-as-a-service. Cloud computing imposes significant security risks on the corporation, network, IT and the day to day activities of the business. How do they maintain compliance, control and ow...
CSA Guidance V.4: Domain 1 now available for review and comments
Published: 11/04/2015
The Cloud Security Alliance's Security Guidance for Critical Areas of Focus in Cloud Computing seeks to establish a stable, secure baseline for cloud operations. It acts as a practical, actionable roadmap to individuals looking to safely and securely adopt the cloud paradigm. Since it's last ...
Consumer IoT Security Impacts
Published: 10/27/2015
Within the CSA Internet of Things (IoT) Working Group, we are researching various topics related to securing IoT implementations within an enterprise. One of the more interesting aspects to consider on this subject is the role that consumer IoT devices play in regards to enterprise security. ...
CSA releases the Cloud Trust Protocol data model and API
Published: 10/15/2015
Creating tools to support Cloud Service Providers (CSPs) transparency and assurance Thanks to the support of our peer reviewers and contributors (including the EU projects SPECS, A4Cloud and CUMULUS), we are pleased to announce the release of the CSA Cloud Trust Protocol (CTP) data model and ...
Cloud Forensics Capability Maturity Model available for Download
Published: 10/13/2015
The Incident Management and Forensics Working Group today released its “Cloud Forensics Capability Maturity Model”, a new research report that describes a Capability Maturity Model (CMM) that can be used by both cloud consumers and Cloud Service Providers (CSPs) in assessing their process matu...
Survey for the CSA Top Threats to Cloud Computing 2015 report is Open
Published: 10/09/2015
The Cloud Security Alliance Top Threats Working Group is conducting a survey of global security concerns in cloud computing. This short survey asks you to rate the relevance of 13 shortlisted security concerns in cloud computing. In addition, you will be given an opportunity to comment on and ...
What Is Post-Quantum Cryptography?
Published: 10/06/2015
Post-quantum cryptography refers to the different classes of new cryptographic algorithms that are currently believed to resist quantum computer attacks. The most pressing issue today is these cryptographic algorithms need to be proactively in place several years before quantum computers are ...
Cloud Security Alliance Releases New Guidance for Identity and Access Management for the Internet of Things
Published: 09/30/2015
Internet of Things (IOT) Working Group Provides Easily Understandable Recommendations for Securely Implementing and Deploying IoT Solutions Las Vegas, NV – CSA Congress 2016 -- Sept 30, 2015 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raisin...
Cloud Security Alliance Announces Annual Ron Knode Service Award Recipients
Published: 09/30/2015
Contributions from Six Dedicated Individual CSA Volunteers Recognized in Honor of the Late CSA Member and Volunteer Contributor Ron Knode LAS VEGAS, NV – CSA CONGRESS 2015 - September 30, 2015 – The Cloud Security Alliance (CSA) today announced the recipients of its fourth annual Ron Knode Se...
How Uber Uses the Cloud to Drive a Mobile Workforce
Published: 09/16/2015
Oceans of ink have already been spilled extolling Uber’s innovative practices and growing profits, but here’s one aspect getting less attention: How the company’s nearly 100 percent cloud-based business empowers its vast network of mobile workers (the drivers)... Read blog post
What’s Hindering the Adoption of Cloud Computing in Europe?
Published: 09/15/2015
As with their counterparts in North America, organizations across Europe are eagerly embracing cloud computing into their operating environment. However, despite the overall enthusiasm around the potential of cloud computing to transform their business practices, many CIOs have real concerns a...