Survey for the CSA Top Threats to Cloud Computing 2015 report is Open
Published: 10/09/2015
The Cloud Security Alliance Top Threats Working Group is conducting a survey of global security concerns in cloud computing. This short survey asks you to rate the relevance of 13 shortlisted security concerns in cloud computing. In addition, you will be given an opportunity to comment on and ...
What Is Post-Quantum Cryptography?
Published: 10/06/2015
Post-quantum cryptography refers to the different classes of new cryptographic algorithms that are currently believed to resist quantum computer attacks. The most pressing issue today is these cryptographic algorithms need to be proactively in place several years before quantum computers are ...
Cloud Security Alliance Releases New Guidance for Identity and Access Management for the Internet of Things
Published: 09/30/2015
Internet of Things (IOT) Working Group Provides Easily Understandable Recommendations for Securely Implementing and Deploying IoT Solutions Las Vegas, NV – CSA Congress 2016 -- Sept 30, 2015 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raisin...
Cloud Security Alliance Announces Annual Ron Knode Service Award Recipients
Published: 09/30/2015
Contributions from Six Dedicated Individual CSA Volunteers Recognized in Honor of the Late CSA Member and Volunteer Contributor Ron Knode LAS VEGAS, NV – CSA CONGRESS 2015 - September 30, 2015 – The Cloud Security Alliance (CSA) today announced the recipients of its fourth annual Ron Knode Se...
How Uber Uses the Cloud to Drive a Mobile Workforce
Published: 09/16/2015
Oceans of ink have already been spilled extolling Uber’s innovative practices and growing profits, but here’s one aspect getting less attention: How the company’s nearly 100 percent cloud-based business empowers its vast network of mobile workers (the drivers)... Read blog post
What’s Hindering the Adoption of Cloud Computing in Europe?
Published: 09/15/2015
As with their counterparts in North America, organizations across Europe are eagerly embracing cloud computing into their operating environment. However, despite the overall enthusiasm around the potential of cloud computing to transform their business practices, many CIOs have real concerns a...
What is Quantum Key Distribution?
Published: 08/11/2015
“What is Quantum Key Distribution” addresses the issues around sharing and securing encryption keys in a quantum world. The position paper provides an overview of key distribution in general, examines some of current approaches and existing challenges of key distribution, and provides a brief ...
IT and the Line of Business – Security vs Usability Survey
Published: 07/31/2015
The undeniable benefits of the cloud – better functionality, scalability, availability, and innovation at lower cost – is driving a secular move to cloud services. These benefits have made the cloud an executive-level and board-level conversation at many companies. As a result, IT is looking t...
Cloud Security Alliance EMEA to Host Fourth Annual Congress
Published: 07/28/2015
Agenda and Keynote Speakers Announced for Premiere European Cloud Security Event Berlin, Germany – July 28, 2015 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environm...
Cloud Security Alliance Unveils Project STRATUS Research Results
Published: 07/15/2015
CSA together with elite team of researchers and practitioners demonstrate prototype tool that automates the auditing process of cloud data governance Hamilton, New Zealand, July 15, 2015 – Cloud Security Alliance® (CSA) participated in the third quarterly meeting of the STRATUS project, a six...
93 Percent of Cloud Services in Healthcare Are Medium to High Risk
Published: 07/10/2015
Unlike surveys that ask people to self report their behavior, our report is the first data-driven analysis of how healthcare organizations are embracing cloud services to reduce IT cost, increase productivity, and improve patient outcomes. Read blog post
Cloud Security Open API: The Future of Cloud Security
Published: 06/29/2015
The Cloud Security Alliance launched the Cloud Security Open API Working Group with the goal to provide guidance for enterprises and cloud service providers on the operation and interoperability of cloud security functions, with a specific goal to protect PII and sensitive data across multiple...
CipherCloud and Cloud Security Alliance Forge Cloud Security Working Group
Published: 06/29/2015
Cloud Security Open API Working Group to standardize key data security best practices for CASB deployments San Jose, Calif., June 29, 2015 – Recognized as the fastest-growing segment of cloud security, the cloud access security broker (CASB) space is still an emerging one where standards have...
The Cloud Security Alliance (CSA) has opened the call for papers for the 2015 CSA APAC Congress
Published: 06/18/2015
The 2015 CSA APAC Congress will be held December 1st-3rd in Guangzhou, China CSA APAC Congress is the premium event for compelling presentations and interesting discussions about research, development, practice and trends related to cloud security. Attendees represent end-user, research and i...
Cloud Security Alliance Expands Star Provider Certification Into China
Published: 06/14/2015
Called CSA C-STAR Assessment, program brings increased security assurance to cloud service providers in the Greater China area based upon CSA global best practices; adoption already underway Guangzhou, CHINA, June 15, 2015 – The Cloud Security Alliance® (CSA) today announced the launch of CSA...
Call for Volunteers: Security Guidance for Critical Areas of Focus in Cloud Computing
Published: 06/08/2015
The Cloud Security Alliance’s (CSA) Security Guidance for Critical Areas of Focus leverages the CSA Cloud Control Matrix and seeks to establish a stable, secure baseline for cloud operations. It acts as a practical, actionable road map to individuals looking to safely and securely adopt the cl...
CSA Establishes Cloud Data Governance Working Group and Releases Governance Framework
Published: 06/04/2015
The Cloud Data Governance working group has been created to design a universal set of principles and map to emerging technologies and techniques for ensuring the privacy, confidentiality, availability, integrity and security of data across private and public clouds. Read blog post
Cloud Security Alliance Releases New Privacy Level Agreement Guidelines to Address Personal Data Protection Compliance
Published: 06/03/2015
Powerful Self-regulatory Tool to Help Cloud Customers Better Understand and Evaluate Cloud Service Providers European Union Wide LONDON - Infosecurity Europe – June 3, 2015 - The Cloud Security Alliance (CSA) Privacy Level Agreement (PLA) Working Group today released the Privacy Level Agreemen...
What is Quantum-Safe Security?
Published: 05/28/2015
The Quantum-Safe Security working group released a position paper titled ‘What is Quantum-Safe Security?’ The document examines the need for a proactive defense against a multi-purpose quantum computer. Read blog post
Who’s backing up BYOD data? One more reason for cloud disaster recovery
Published: 05/28/2015
If you’re among the 60% of organizations that don’t have a disaster recovery plan, or among the 59% that only back up data in one location, here are 5 good reasons to shore up your plan and include the cloud as one of your endpoint backup solutions... Read blog post