What is Quantum Key Distribution?
Published: 08/11/2015
“What is Quantum Key Distribution” addresses the issues around sharing and securing encryption keys in a quantum world. The position paper provides an overview of key distribution in general, examines some of current approaches and existing challenges of key distribution, and provides a brief ...
IT and the Line of Business – Security vs Usability Survey
Published: 07/31/2015
The undeniable benefits of the cloud – better functionality, scalability, availability, and innovation at lower cost – is driving a secular move to cloud services. These benefits have made the cloud an executive-level and board-level conversation at many companies. As a result, IT is looking t...
Cloud Security Alliance EMEA to Host Fourth Annual Congress
Published: 07/28/2015
Agenda and Keynote Speakers Announced for Premiere European Cloud Security Event Berlin, Germany – July 28, 2015 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environm...
Cloud Security Alliance Unveils Project STRATUS Research Results
Published: 07/15/2015
CSA together with elite team of researchers and practitioners demonstrate prototype tool that automates the auditing process of cloud data governance Hamilton, New Zealand, July 15, 2015 – Cloud Security Alliance® (CSA) participated in the third quarterly meeting of the STRATUS project, a six...
93 Percent of Cloud Services in Healthcare Are Medium to High Risk
Published: 07/10/2015
Unlike surveys that ask people to self report their behavior, our report is the first data-driven analysis of how healthcare organizations are embracing cloud services to reduce IT cost, increase productivity, and improve patient outcomes. Read blog post
Cloud Security Open API: The Future of Cloud Security
Published: 06/29/2015
The Cloud Security Alliance launched the Cloud Security Open API Working Group with the goal to provide guidance for enterprises and cloud service providers on the operation and interoperability of cloud security functions, with a specific goal to protect PII and sensitive data across multiple...
CipherCloud and Cloud Security Alliance Forge Cloud Security Working Group
Published: 06/29/2015
Cloud Security Open API Working Group to standardize key data security best practices for CASB deployments San Jose, Calif., June 29, 2015 – Recognized as the fastest-growing segment of cloud security, the cloud access security broker (CASB) space is still an emerging one where standards have...
The Cloud Security Alliance (CSA) has opened the call for papers for the 2015 CSA APAC Congress
Published: 06/18/2015
The 2015 CSA APAC Congress will be held December 1st-3rd in Guangzhou, China CSA APAC Congress is the premium event for compelling presentations and interesting discussions about research, development, practice and trends related to cloud security. Attendees represent end-user, research and i...
Cloud Security Alliance Expands Star Provider Certification Into China
Published: 06/14/2015
Called CSA C-STAR Assessment, program brings increased security assurance to cloud service providers in the Greater China area based upon CSA global best practices; adoption already underway Guangzhou, CHINA, June 15, 2015 – The Cloud Security Alliance® (CSA) today announced the launch of CSA...
Call for Volunteers: Security Guidance for Critical Areas of Focus in Cloud Computing
Published: 06/08/2015
The Cloud Security Alliance’s (CSA) Security Guidance for Critical Areas of Focus leverages the CSA Cloud Control Matrix and seeks to establish a stable, secure baseline for cloud operations. It acts as a practical, actionable road map to individuals looking to safely and securely adopt the cl...
CSA Establishes Cloud Data Governance Working Group and Releases Governance Framework
Published: 06/04/2015
The Cloud Data Governance working group has been created to design a universal set of principles and map to emerging technologies and techniques for ensuring the privacy, confidentiality, availability, integrity and security of data across private and public clouds. Read blog post
Cloud Security Alliance Releases New Privacy Level Agreement Guidelines to Address Personal Data Protection Compliance
Published: 06/03/2015
Powerful Self-regulatory Tool to Help Cloud Customers Better Understand and Evaluate Cloud Service Providers European Union Wide LONDON - Infosecurity Europe – June 3, 2015 - The Cloud Security Alliance (CSA) Privacy Level Agreement (PLA) Working Group today released the Privacy Level Agreemen...
What is Quantum-Safe Security?
Published: 05/28/2015
The Quantum-Safe Security working group released a position paper titled ‘What is Quantum-Safe Security?’ The document examines the need for a proactive defense against a multi-purpose quantum computer. Read blog post
Who’s backing up BYOD data? One more reason for cloud disaster recovery
Published: 05/28/2015
If you’re among the 60% of organizations that don’t have a disaster recovery plan, or among the 59% that only back up data in one location, here are 5 good reasons to shore up your plan and include the cloud as one of your endpoint backup solutions... Read blog post
Healthcare Duped By “Spellcheck” Phishing Attack Again?
Published: 05/25/2015
The “Spellcheck” phishing attack may very well be the most advanced spear phishing attack the world has ever seen. Playing off of human error makes preventing breaches/limiting the damage a people problem, just as much as it is a security technology gap. Read blog post
Cloud Security Alliance Launches New Asia-Pacific Education Council
Published: 05/25/2015
Group Holds Kick-Off Meeting to Finalize Charter and Outline Upcoming Initiatives SINGAPORE – May 25, 2015 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment, t...
CSA Releases New Whitepaper on Virtualization Security Best Practices
Published: 05/07/2015
The CSA's Virtualization working group released a whitepaper entitled: “Best Practices for Mitigating Risks in Virtualized Environments” which provides guidance on the identification and management of security risks specific to compute virtualization technologies that run on server hardware. ...
CSA Launches Best Practices for Mitigating Risks in Virtualized Environments
Published: 05/06/2015
At this year’s RSA Conference, the Cloud Security Alliance released a new whitepaper entitled: “Best Practices for Mitigating Risks in Virtualized Environments” which provides guidance on the identification and management of security risks specific to compute virtualization technologies that r...
CSA CloudBytes: May Webcast
Published: 05/06/2015
The Cloud Security Alliance CloudBytes webinar series is dedicated to educate the industry on the latest trends and topics in cloud computing. From regulation and risk in the cloud to the latest topics in IoT and data protection and privacy, we've reached thousands with our messages from top i...
Cloud Security Alliance Releases Candidate Mapping of FedRAMP Security Controls
Published: 05/05/2015
At the Cloud Security Alliance Federal Summit, the CSA announced the release of the Candidate Mapping V4 of the FedRAMP security controls to version 3.0.1 of the CSA Cloud Controls Matrix (CCM). The FedRAMP controls are based on the National Institute of Standards and Technology (NIST) Special...