Top Threats to Cloud Computing

The purpose of this document, Top Threats to Cloud Computing, is to provide needed context to assist organizations in making educated risk management decisions regarding their cloud adoption strategies. In essence, this threat research document should be seen as a companion to Security Guidance for Critical Areas in Cloud Computing. As the first deliverable in the CSA’s Cloud Threat Initiative, the “Top Threats” document will be updated regularly to reflect expert consensus on the probable threats which customers should be concerned about.

Key Information

Download Top Threats Report V1.0
Joining Top Threats Research Working Group
CSA Top Threats LinkedIn SubGroup
Top Threats Submission Form

Top Threats News

Press Release: September 9, 2010
Press Release: March 1, 2010

Top Threats Research Leadership

Dan Hubbard, CTO, Websense
Larry J. Hughes Jr., Founder and Principal, Infosec Introspect
Michael Sutton, VP Research, Zscaler

Joining Initiative

There is one step to participate in the CSA Threat Research Working Group:

1. Join CSA Top Threats LinkedIn SubGroup for official working group updates.

Initiative Sponsor

HP

You can follow us here: