ChaptersCircleEventsBlog
Join us for the in-person CCSK Azure course at Black Hat from August 4–5! Register now for a hands-on deep dive and secure your spot now!

Announcements

Announcements
Trusted Cloud - Global Connect Program
Trusted Cloud - Global Connect Program

Sys-Con Media

January 14, 2011

Cloud Security Alliance plans at RSA Conference 2011
Cloud Security Alliance plans at RSA Conference 2011

Private Cloud

January 10, 2011

Cloud product strategies for telcos
Cloud product strategies for telcos

Sys-Con Media

January 9, 2011

How Secure Is The Cloud?
How Secure Is The Cloud?

Tom's Hardware

December 22, 2010

How VMware Plans to Deploy Security Inside Hypervisor in 2011
How VMware Plans to Deploy Security Inside Hypervisor in 2011

E Week

December 20, 2010

CSA Updates Cloud Security Framework
CSA Updates Cloud Security Framework

Network Computing

December 20, 2010

How to check on your cloud provider
How to check on your cloud provider

CIO

December 18, 2010

Newsbytes: Cloud Security Alliance, SecPoint, Liveware, Hotmail, Synchronica, Myriad, & Pixel Power
Newsbytes: Cloud Security Alliance, SecPoint, Liveware, Hotmail, Synchronica, Myriad, & Pixel Power

Tech Watch

December 17, 2010

Cloud Controls Matrix 1.1 released
Cloud Controls Matrix 1.1 released

Help Net Security

December 17, 2010

Five cloud security trends experts see for 2011
Five cloud security trends experts see for 2011

Network World

December 16, 2010

GRC Comes to the Cloud
GRC Comes to the Cloud

IT Business Edge

December 13, 2010

Cloud computing technology: Don't get left behind
Cloud computing technology: Don't get left behind

Search Security

December 6, 2010

Cloud computing 'still intimidates businesses'
Cloud computing 'still intimidates businesses'

Cryptzone

December 6, 2010

Vendor Press Releases
Vendor Press Releases

Enterprise Systems

December 6, 2010

Cloud computing technologies and financial services
Cloud computing technologies and financial services

Search Financial Security

December 2, 2010

Top 8 Reasons why Identity and Access Management is essential for Cloud Environment?
Top 8 Reasons why Identity and Access Management is essential for Cloud Environment?

Cloud-Identity

November 25, 2010

Public sector approaches to public cloud have to relax
Public sector approaches to public cloud have to relax

CIO

November 25, 2010

Choosing the right cloud provider
Choosing the right cloud provider

The globe and mail

November 25, 2010

Government regulation looms over cloud security
Government regulation looms over cloud security

Search Cloud Computing

November 18, 2010

CSA Congress: Cloud security achieved through sound policy, says Symantec chairman
CSA Congress: Cloud security achieved through sound policy, says Symantec chairman

Info Security

November 17, 2010