CSA Research Artifacts

Whitepapers, Reports and Other Resources

Home
Research Artifacts

Browse Research Artifacts

Using BlockChain Technology to Secure the Internet of Things - Chinese Translation

Using BlockChain Technology to Secure the Internet of Things - Chinese Translation
Release Date: 08/03/2018

在过去的四年中,技术专家、首席数字官、营销经理、记者、博客作者和研究机构讨论 并 推广了一种新的分布式模型,将区块链技术应用于安全事务处理和存储。国际数据公司 IDC FutureScape 预测,到 2020 年,全球 20%的贸易融资将纳入区块链。

Request to download
Security Guidance v4.0 - Chinese Translation

Security Guidance v4.0 - Chinese Translation
Release Date: 08/03/2018

欢迎来到云安全联盟关于云计算关键领域安全指南的第四个版本。云计算的兴起是一项不 断发展的技术,它带来了许多机遇和挑战。通过这个文档,我们的目标是提供指导和灵感来支 持业务目标,同时管理和减轻采用云计算技术相关的风险。

Request to download
GEAB State of the Cloud 2018 - Chinese Translation

GEAB State of the Cloud 2018 - Chinese Translation
Release Date: 08/03/2018

云安全联盟全球企业顾问委员会成立于2016年,是由十多位行业的大型跨国公 司的顶尖专家组成的代表团队。该委员会的成立是为了表达大型IT终端用户的观点, 并融合云计算使用者信息安全相关的观点。

Request to download
CSA Code of Conduct for GDPR Compliance - Chinese Translation

CSA Code of Conduct for GDPR Compliance - Chinese Translation
Release Date: 08/03/2018

云安全联盟 CSA 近期发布了 CoC for GDPR Compliance(CSA GDPR 合规行为准则),旨 在为云服务提供商(CSP)、云消费者、及相关企业提供 GDPR 合规解决方案,并提供涉及云服 务提供商应提交的关于数据保护级别的透明性准则。这个准则为各种规模的客户提供工具来评 估其个人数据...

Request to download
Building a Foundation for Successful Cyber Threat Intelligence Exchange - Chinese Translation

Building a Foundation for Successful Cyber Threat Intelligence Exchange - Chinese Translation
Release Date: 08/03/2018

描述: 当前网络攻击的频率和复杂程度在不断提高。攻击者可能是个人,也可能是资源丰富、 组织严密的团伙。面对这样的威胁,企业如果只关注内部防护措施,可能建成最后被绕过 “马其顿防线”;如果只依赖自身的情报能力,可能面临攻防不对等的窘境。为了解决上述问 题,网络威胁情报(CTI...

Request to download
CCM Mapping Methodology

CCM Mapping Methodology
Release Date: 07/09/2018

Description: The Cloud Security Alliance (CSA) Cloud Controls Matrix (CCM) provides fundamental security principles to guide cloud vendor...

Request to download
Firmware Integrity in the Cloud Data Center

Firmware Integrity in the Cloud Data Center
Release Date: 06/12/2018

Description: This paper presents the point of view from key stakeholders in datacenter development regarding how to build cloud infrastru...

Request to download
Software Defined Perimeter Glossary

Software Defined Perimeter Glossary
Release Date: 06/12/2018

Description: The Software Defined Perimeter (SDP) Glossary is a reference document that brings together SDP related terms and definitions...

Request to download
The State of Post-Quantum Cryptography

The State of Post-Quantum Cryptography
Release Date: 05/23/2018

Description: Most people pay little attention to the lock icon on their browser’s address bar that signifies a secure connection called H...

Request to download
The Treacherous 12 – Top Threats to Cloud Computing + Industry Insights - Japanese Translation

The Treacherous 12 – Top Threats to Cloud Computing + Industry Insights - Japanese Translation
Release Date: 05/21/2018

誰も予測できなかった速さで、クラウドコンピューティングはビジネスや政府に等しく変容を迫り、そ して新たなセキュリティ課題をもたらしている。クラウドのサービスモデルが開発されることで、ビジ ネスを支える技術はかつてないほど効率性の高いものになった。サーバを保有する発想からサービ ス利用ベースの思考への転換は、IT ...

Request to download

Justify Your Investment in Cloud Security Training
Release Date: 05/02/2018

The Certificate of Cloud Security Knowledge (CCSK) Foundation class provides students a comprehensive review of cloud security fundamentals and a detailed de...

Request to download
A Day Without Safe Cryptography

A Day Without Safe Cryptography
Release Date: 04/19/2018

Description: Over the past fifty years, the digital age has sparked the creation of a remarkable infrastructure through which a nearly in...

Request to download
GDPR Preparation and Awareness Survey Report

GDPR Preparation and Awareness Survey Report
Release Date: 04/17/2018

Description: Cloud computing, the Internet of Things, Artificial Intelligence, and other new technologies allow businesses to have better...

Request to download
State of Cloud Report

State of Cloud Report
Release Date: 04/16/2018

Description: Innovators and early adopters have been using cloud for years taking advantage of the quicker deployment, greater scalabilit...

Request to download
Best Practices for Cyber Incident Exchange

Best Practices for Cyber Incident Exchange
Release Date: 04/16/2018

Description: No organization is immune from cyber attack. Malicious actors collaborate with skill and agility, effectively moving from ta...

Request to download
Using Blockchain Technology to Secure the Internet of Things

Using Blockchain Technology to Secure the Internet of Things
Release Date: 02/13/2018

Description: In the last four years, technical experts, chief digital officers, marketing managers, journalists, bloggers and research in...

Request to download
The State of Enterprise Resource Planning Security in the Cloud

The State of Enterprise Resource Planning Security in the Cloud
Release Date: 02/07/2018

Description: The State of ERP Security in the Cloud briefly highlights some of the issues and challenges of migrating ERP solutions to th...

Request to download
Quantum-Safe Security Awareness Survey

Quantum-Safe Security Awareness Survey
Release Date: 01/26/2018

Request to download
Blockchain/Distributed Ledger Working Group Glossary

Blockchain/Distributed Ledger Working Group Glossary
Release Date: 12/15/2017

Request to download
Security Guidance for Critical Areas of Focus in Cloud Computing v4.0 - Japanese Translation

Security Guidance for Critical Areas of Focus in Cloud Computing v4.0 - Japanese Translation
Release Date: 12/15/2017

Request to download