ChaptersCircleEventsBlog
Participate in the DevSecOps and Generative AI peer review to help shape industry insights!

Press Releases

Press Releases
RSVP to exciting CloudBytes Webinars in January

Published: 12/15/2015

CloudBytes webinar series is dedicated to educating the public on all things related to the cloud and next generation IT. We have two exciting webinars coming up: Making Trusted Decisions to Use the Cloud: A New Model to Succeed Presenter: Jeffrey Ritter, External Lecturer, University of Ox...

CSA’s Cloud Control Matrix (CCM) Releases Minor Update to Version 3.0.1

Published: 12/11/2015

CSA’s Cloud Control Matrix (CCM) Working Group has released a series of minor updates and corrections to version 3.0.1 of its CCM. These minor updates/corrections were based on feedback from our CCM user community. A tab was created in the spreadsheet titled “CCM Change Log” to capture the de...

CSA Releases CloudTrust Protocol Prototype Source Code

Published: 12/10/2015

Thanks to the support of our peer reviewers and contributors (including the EU projects SPECS, A4Cloud and CUMULUS), CSA is pleased to announce the release of an open-source prototype implementation of the CTP API. The Cloud Trust Protocol (CTP) is designed to be a mechanism by which cloud se...

Cloud Security Alliance Releases Mobile Application Security Testing Initiative

Published: 12/02/2015

White Paper Ready for Peer Review SINGAPORE – December 2, 2015 - The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment, today announced that its Mobile Application S...

Cloud Security Alliance Adds Chinese Universities to the APAC Education Council

Published: 12/02/2015

SINGAPORE – December 2, 2015 - The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment, today announced the launch of the new CSA Asia- Pacific (APAC) Education Council...

Cloud Security Alliance Successfully hosts Cross-Straits Working Level Meeting on Cybersecurity Following Xi-Ma Meeting in Singapore

Published: 12/01/2015

SINGAPORE – December 1, 2015 - On November 7, 2015, Mr Xi Jinping, President of the People's Republic of China (PRC), and Mr Ma Ying-jeou, President of the Republic of China (ROC/Chinese Taipei), met in Singapore. The Xi-Ma meeting held in Singapore has been one of the most significant events ...

Securing Smart Cities Issues Guidelines for Smart City Technology Adoption

Published: 11/18/2015

Securing Smart Cities, the not-for-profit global initiative addressing the cyber security challenges of smart cities, today released guidelines jointly developed by Securing Smart Cities and the Cloud Security Alliance (CSA) for the adoption of smart city technology. The guide provides organiz...

Cloud Security Alliance Summit Los Angeles 2015 To Feature Top Experts from Entertainment and Enterprise on Lessons Learned in Cloud Security

Published: 11/17/2015

Speakers from The Honest Company, PwC, University of Oxford, Microsoft, Google, SpaceX and Evident.io to Be Featured at the Upcoming Inaugural Event Los Angeles, CA – November 17, 2015 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awar...

Upcoming Webinars on Safe Harbor and CASB Capabilities

Published: 11/10/2015

CloudBytes webinar series is dedicated to educating the public on all things related to the cloud and next generation IT. We have two exciting webinars coming up: Can I Still Use the Cloud? Now that Safe Harbor is Dead Presented by Nigel Hawthorn of Skyhigh Nov 24th--6:00am PT (2:00pm GMT) ...

Keep your Data and Applications Safe from CSA Top Threats

Published: 11/04/2015

The cloud presents all kinds of opportunities for today’s enterprise, from anywhere access to anything-as-a-service. Cloud computing imposes significant security risks on the corporation, network, IT and the day to day activities of the business. How do they maintain compliance, control and ow...

CSA Guidance V.4: Domain 1 now available for review and comments

Published: 11/04/2015

The Cloud Security Alliance's Security Guidance for Critical Areas of Focus in Cloud Computing seeks to establish a stable, secure baseline for cloud operations. It acts as a practical, actionable roadmap to individuals looking to safely and securely adopt the cloud paradigm. Since it's last ...

Consumer IoT Security Impacts

Published: 10/27/2015

Within the CSA Internet of Things (IoT) Working Group, we are researching various topics related to securing IoT implementations within an enterprise. One of the more interesting aspects to consider on this subject is the role that consumer IoT devices play in regards to enterprise security. ...

CSA releases the Cloud Trust Protocol data model and API

Published: 10/15/2015

Creating tools to support Cloud Service Providers (CSPs) transparency and assurance Thanks to the support of our peer reviewers and contributors (including the EU projects SPECS, A4Cloud and CUMULUS), we are pleased to announce the release of the CSA Cloud Trust Protocol (CTP) data model and ...

Cloud Forensics Capability Maturity Model available for Download

Published: 10/13/2015

The Incident Management and Forensics Working Group today released its “Cloud Forensics Capability Maturity Model”, a new research report that describes a Capability Maturity Model (CMM) that can be used by both cloud consumers and Cloud Service Providers (CSPs) in assessing their process matu...

Survey for the CSA Top Threats to Cloud Computing 2015 report is Open

Published: 10/09/2015

The Cloud Security Alliance Top Threats Working Group is conducting a survey of global security concerns in cloud computing. This short survey asks you to rate the relevance of 13 shortlisted security concerns in cloud computing. In addition, you will be given an opportunity to comment on and ...

What Is Post-Quantum Cryptography?

Published: 10/06/2015

Post-quantum cryptography refers to the different classes of new cryptographic algorithms that are currently believed to resist quantum computer attacks. The most pressing issue today is these cryptographic algorithms need to be proactively in place several years before quantum computers are ...

Cloud Security Alliance Releases New Guidance for Identity and Access Management for the Internet of Things

Published: 09/30/2015

Internet of Things (IOT) Working Group Provides Easily Understandable Recommendations for Securely Implementing and Deploying IoT Solutions Las Vegas, NV – CSA Congress 2016 -- Sept 30, 2015 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raisin...

Cloud Security Alliance Announces Annual Ron Knode Service Award Recipients

Published: 09/30/2015

Contributions from Six Dedicated Individual CSA Volunteers Recognized in Honor of the Late CSA Member and Volunteer Contributor Ron Knode LAS VEGAS, NV – CSA CONGRESS 2015 - September 30, 2015 – The Cloud Security Alliance (CSA) today announced the recipients of its fourth annual Ron Knode Se...

How Uber Uses the Cloud to Drive a Mobile Workforce

Published: 09/16/2015

Oceans of ink have already been spilled extolling Uber’s innovative practices and growing profits, but here’s one aspect getting less attention: How the company’s nearly 100 percent cloud-based business empowers its vast network of mobile workers (the drivers)... Read blog post

What’s Hindering the Adoption of Cloud Computing in Europe?

Published: 09/15/2015

As with their counterparts in North America, organizations across Europe are eagerly embracing cloud computing into their operating environment. However, despite the overall enthusiasm around the potential of cloud computing to transform their business practices, many CIOs have real concerns a...

Looking for the CCM?

Start using the Cloud Controls Matrix to simplify compliance with multiple standards & regulations.