ChaptersEventsBlog
How is your enterprise using AI Agents? Help us benchmark security and take the survey before November 30 →

Press Releases

Press Releases
Cloud Security Alliance Adds Chinese Universities to the APAC Education Council

Published: 12/02/2015

SINGAPORE – December 2, 2015 - The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment, today announced the launch of the new CSA Asia- Pacific (APAC) Education Council...

Cloud Security Alliance Successfully hosts Cross-Straits Working Level Meeting on Cybersecurity Following Xi-Ma Meeting in Singapore

Published: 12/01/2015

SINGAPORE – December 1, 2015 - On November 7, 2015, Mr Xi Jinping, President of the People's Republic of China (PRC), and Mr Ma Ying-jeou, President of the Republic of China (ROC/Chinese Taipei), met in Singapore. The Xi-Ma meeting held in Singapore has been one of the most significant events ...

Securing Smart Cities Issues Guidelines for Smart City Technology Adoption

Published: 11/18/2015

Securing Smart Cities, the not-for-profit global initiative addressing the cyber security challenges of smart cities, today released guidelines jointly developed by Securing Smart Cities and the Cloud Security Alliance (CSA) for the adoption of smart city technology. The guide provides organiz...

Cloud Security Alliance Summit Los Angeles 2015 To Feature Top Experts from Entertainment and Enterprise on Lessons Learned in Cloud Security

Published: 11/17/2015

Speakers from The Honest Company, PwC, University of Oxford, Microsoft, Google, SpaceX and Evident.io to Be Featured at the Upcoming Inaugural Event Los Angeles, CA – November 17, 2015 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awar...

Upcoming Webinars on Safe Harbor and CASB Capabilities

Published: 11/10/2015

CloudBytes webinar series is dedicated to educating the public on all things related to the cloud and next generation IT. We have two exciting webinars coming up: Can I Still Use the Cloud? Now that Safe Harbor is Dead Presented by Nigel Hawthorn of Skyhigh Nov 24th--6:00am PT (2:00pm GMT) ...

Keep your Data and Applications Safe from CSA Top Threats

Published: 11/04/2015

The cloud presents all kinds of opportunities for today’s enterprise, from anywhere access to anything-as-a-service. Cloud computing imposes significant security risks on the corporation, network, IT and the day to day activities of the business. How do they maintain compliance, control and ow...

CSA Guidance V.4: Domain 1 now available for review and comments

Published: 11/04/2015

The Cloud Security Alliance's Security Guidance for Critical Areas of Focus in Cloud Computing seeks to establish a stable, secure baseline for cloud operations. It acts as a practical, actionable roadmap to individuals looking to safely and securely adopt the cloud paradigm. Since it's last ...

Consumer IoT Security Impacts

Published: 10/27/2015

Within the CSA Internet of Things (IoT) Working Group, we are researching various topics related to securing IoT implementations within an enterprise. One of the more interesting aspects to consider on this subject is the role that consumer IoT devices play in regards to enterprise security. ...

CSA releases the Cloud Trust Protocol data model and API

Published: 10/15/2015

Creating tools to support Cloud Service Providers (CSPs) transparency and assurance Thanks to the support of our peer reviewers and contributors (including the EU projects SPECS, A4Cloud and CUMULUS), we are pleased to announce the release of the CSA Cloud Trust Protocol (CTP) data model and ...

Cloud Forensics Capability Maturity Model available for Download

Published: 10/13/2015

The Incident Management and Forensics Working Group today released its “Cloud Forensics Capability Maturity Model”, a new research report that describes a Capability Maturity Model (CMM) that can be used by both cloud consumers and Cloud Service Providers (CSPs) in assessing their process matu...

Survey for the CSA Top Threats to Cloud Computing 2015 report is Open

Published: 10/09/2015

The Cloud Security Alliance Top Threats Working Group is conducting a survey of global security concerns in cloud computing. This short survey asks you to rate the relevance of 13 shortlisted security concerns in cloud computing. In addition, you will be given an opportunity to comment on and ...

What Is Post-Quantum Cryptography?

Published: 10/06/2015

Post-quantum cryptography refers to the different classes of new cryptographic algorithms that are currently believed to resist quantum computer attacks. The most pressing issue today is these cryptographic algorithms need to be proactively in place several years before quantum computers are ...

Cloud Security Alliance Releases New Guidance for Identity and Access Management for the Internet of Things

Published: 09/30/2015

Internet of Things (IOT) Working Group Provides Easily Understandable Recommendations for Securely Implementing and Deploying IoT Solutions Las Vegas, NV – CSA Congress 2016 -- Sept 30, 2015 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raisin...

Cloud Security Alliance Announces Annual Ron Knode Service Award Recipients

Published: 09/30/2015

Contributions from Six Dedicated Individual CSA Volunteers Recognized in Honor of the Late CSA Member and Volunteer Contributor Ron Knode LAS VEGAS, NV – CSA CONGRESS 2015 - September 30, 2015 – The Cloud Security Alliance (CSA) today announced the recipients of its fourth annual Ron Knode Se...

How Uber Uses the Cloud to Drive a Mobile Workforce

Published: 09/16/2015

Oceans of ink have already been spilled extolling Uber’s innovative practices and growing profits, but here’s one aspect getting less attention: How the company’s nearly 100 percent cloud-based business empowers its vast network of mobile workers (the drivers)... Read blog post

What’s Hindering the Adoption of Cloud Computing in Europe?

Published: 09/15/2015

As with their counterparts in North America, organizations across Europe are eagerly embracing cloud computing into their operating environment. However, despite the overall enthusiasm around the potential of cloud computing to transform their business practices, many CIOs have real concerns a...

What is Quantum Key Distribution?

Published: 08/11/2015

“What is Quantum Key Distribution” addresses the issues around sharing and securing encryption keys in a quantum world. The position paper provides an overview of key distribution in general, examines some of current approaches and existing challenges of key distribution, and provides a brief ...

IT and the Line of Business – Security vs Usability Survey

Published: 07/31/2015

The undeniable benefits of the cloud – better functionality, scalability, availability, and innovation at lower cost – is driving a secular move to cloud services. These benefits have made the cloud an executive-level and board-level conversation at many companies. As a result, IT is looking t...

Cloud Security Alliance EMEA to Host Fourth Annual Congress

Published: 07/28/2015

Agenda and Keynote Speakers Announced for Premiere European Cloud Security Event Berlin, Germany – July 28, 2015 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environm...

Cloud Security Alliance Unveils Project STRATUS Research Results

Published: 07/15/2015

CSA together with elite team of researchers and practitioners demonstrate prototype tool that automates the auditing process of cloud data governance Hamilton, New Zealand, July 15, 2015 – Cloud Security Alliance® (CSA) participated in the third quarterly meeting of the STRATUS project, a six...

Looking for the CCM?

Start using the Cloud Controls Matrix to simplify compliance with multiple standards & regulations.