CSA Seeks Input on SecaaS Categories of Service Implementation Guidance Documents
Published: 08/07/2012
As we did with the first wave of SecaaS peer reviews, the CSA Security as a Service (SecaaS) Working Group has expanded upon their "Defined Categories of Service" document released last year. Implementation Guidance documents, for each category of service previously defined, are being develop...
CSA Seeks Input on CCM v1.3 FedRAMP Mapping Document
Published: 08/06/2012
The Cloud Security Alliance (CSA) Cloud Controls Matrix (CCM) Working Group (WG) would like to invite you to review and comment on a preliminary draft of CCM v1.3 with a revised mapping of the Federal Risk and Authorization Management Program (FedRAMP) security controls published January 2012....
Take the Top Threats to Cloud Computing Survey
Published: 07/24/2012
The Cloud Security Alliance (CSA) requests your input to update the Top Threats to Cloud Computing. This survey's purpose is to identify whether the Top Threats first identified by the CSA are still relevant today. The short survey can be taken here: https://www.surveymonkey.com/s/TopThreats R...
Cloud Security Alliance Selects Singapore as Site for Corporate Headquarters, Continues APAC Expansion Initiative
Published: 07/20/2012
CSA and Singapore Government Undertake Long-Term Public-Private Partnership to Further The Security of Cloud Computing Singapore – July 20, 2012 – The Cloud Security Alliance (CSA) today announced the establishment of the new CSA corporate headquarters in Singapore, under an effort led by the...
CSA Research Sponsorship Opportunities Available
Published: 07/18/2012
Cloud Security Alliances announces the availability of several new opportunities to sponsor key research initiatives. Your support helps us maintain our aggressive research schedule and accelerate responsible adoption of cloud computing. These projects provide excellent marketing benefits for ...
Article 29 Working Party cloud computing opinion: Blow to Safe Harbor?
Published: 07/16/2012
The following blog excerpt on “Article 29 Working Party cloud computing opinion: Blow to Safe Harbor?” was written by the external legal counsel of the CSA, Ms. Francoise Gilbert of the IT Law Group. We repost it here with her permission. It can be viewed in its original form at: http://search...
Take the CSA Top Threats to Mobile Computing Survey
Published: 07/11/2012
The Cloud Security Alliance's Mobile Working Group requests your participation in the inaugural "Top Threats to Mobile Computing" survey. Due to the rapid adoption of mobile computing, and immediate connection to cloud computing, the CSA is creating a “Top Threats to Mobile Computing” in addit...
CSA Seeks Input on "Mobile Device Management: Key Components" whitepaper
Published: 07/07/2012
With the growth in the number of applications, content, and data being accessed through a variety of devices, Mobile Device Management (MDM) is vital to managing the mobile enterprise. MDM is about much more than device management alone—it includes system-centric functionality to secure and ma...
Cloud Security Alliance, Esther Dyson and Amrita University Co-Chair ‘Startup Pitchfest’ at SecureIT
Published: 07/02/2012
Pitchfest to be Co-located with First International Conference on Security of Internet of Things, Keynoted by CSA’s Executive Director Jim Reavis Kerala, India, July 2, 2012 – The Cloud Security Alliance (CSA), as part of the CSA Innovation Initiative, along with Esther Dyson and Amrita ...
CNIL (French Data Protection Authority) Recommendations on the use of Cloud Computing Services
Published: 06/29/2012
The following blog entry on "CNIL on Cloud Computing" was written by the external legal counsel of the CSA, Ms. Francoise Gilbert of the IT Law Group. We repost it here with her permission. It can be viewed in its original form at: http://www.francoisegilbert.com/2012/06/cnil-on-cloud-computin...
CSA Launches PhD Studentship Programme in Europe CSA Calls for University Participation in PhD and Postgraduate Studentship Programme for Security and Privacy in Cloud Computing
Published: 06/28/2012
EDINBURGH, SCOTLAND – June 28, 2012 – The Cloud Security Alliance (CSA) today announced a PhD studentship programme in the context of its Education and Training activities. CSA will partner with universities and research centers in Europe to recruit talented PhD researchers in the area of clou...
CSA Seeks Input on Top Threats to Mobile Computing Document
Published: 06/27/2012
The Cloud Security Alliance's Mobile Working Group requests your review and survey participation for the first "Top Threats to Mobile Computing". Currently the CSA has a working group dedicated to tracking and reporting on the top X threats to the cloud. That project is currently working on ...
Outline of BCR for Processors Published by Article 29 Working Party
Published: 06/20/2012
On June 19th, the Article 29 Working Party, which is composed of Data Protection Authorities from the member states of the European Union, released an important opinion on the use of a legal means to move personal data outside of the border of the EU, called Binding Corporate Rules (BCRs). The...
Brochure Now Available for the Cloud Security Alliance EMEA Congress in Amsterdam
Published: 06/20/2012
The Cloud Security Alliance is delighted to announce that the brochure for the Cloud Security Alliance EMEA Congress 2012, 25th -26th September, Amsterdam is now available to download from www.cloudsecuritycongress.com. The agenda is packed full of keynotes and case studies from the leading ex...
CSA Remembers Ron Knode 1946-2012
Published: 06/06/2012
A Cherished Member of our CommunityRon Knode, noted information security expert and member of the Cloud Security Alliance family, passed away on May 31, 2012. Ron was an innovative thinker and the author of the CloudTrust Protocol. Ron was a cherished member of CSA, with endless energy and hum...
Participate in the CSA Website Usability Survey
Published: 05/22/2012
The Cloud Security Alliance invites you to participate in its website usability survey, a short questionnaire about your experience with the CSA site. The survey will be available for a 2-week period, from May 22 to June 5, 2012. The survey asks your reasons for visiting the CSA site, the page...
Cloud Security Alliance Expands Leadership Team With its First Chief Operating Officer
Published: 05/21/2012
John Howie to Support Organization’s Expanding Member, Research and Event Initiatives SEATTLE, WA – May 21, 2012 – The Cloud Security Alliance (CSA) announced today the appointment of information and communications technology veteran John Howie to the position of Chief Operating Officer (COO)...
CSA Launches Hong Kong and Macau Chapter at "Building Trust in Cloud Computing" Summit 2012
Published: 05/17/2012
Summit Highlighted by Opening Address from Mr. Daniel Lai, BBS, JP, Government CIO, and Keynotes by Jim Reavis, Co-founder and Executive Director of CSA, and Tim Grance, Senior Computer Scientist at NIST Hong Kong, May 18, 2012 – The Cloud Security Alliance (CSA) yesterday officially launched...
Infocomm Development Authority of Singapore and Cloud Security Alliance Launch Joint Initiative to Create Trusted Cloud Ecosystem in Singapore
Published: 05/15/2012
Singapore, May 15, 2012 – Today at CloudAsia 2012, the Infocomm Development Authority of Singapore (IDA) and the Cloud Security Alliance (CSA) will launch a joint initiative to create a trusted cloud eco-system in Singapore, bringing together the key stakeholders in the Cloud to accelerate Sin...
CSA and ISACA Issue Joint Survey on Cloud Maturity - Now Open for Responses
Published: 05/14/2012
Cloud Market Maturity Task Force is the First Collaborative Project Between CSA and ISACA Rolling Meadows, IL – May 14, 2012 – Today, the Cloud Security Alliance (CSA) and ISACA announced the availability of a new survey on cloud market maturity, part of the first collaborative project betwe...