ChaptersCircleEventsBlog

Press Releases

Press Releases
Healthcare Duped By “Spellcheck” Phishing Attack Again?

Published: 05/25/2015

The “Spellcheck” phishing attack may very well be the most advanced spear phishing attack the world has ever seen. Playing off of human error makes preventing breaches/limiting the damage a people problem, just as much as it is a security technology gap. Read blog post

Cloud Security Alliance Launches New Asia-Pacific Education Council

Published: 05/25/2015

Group Holds Kick-Off Meeting to Finalize Charter and Outline Upcoming Initiatives SINGAPORE – May 25, 2015 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment, t...

CSA Releases New Whitepaper on Virtualization Security Best Practices

Published: 05/07/2015

The CSA's Virtualization working group released a whitepaper entitled: “Best Practices for Mitigating Risks in Virtualized Environments” which provides guidance on the identification and management of security risks specific to compute virtualization technologies that run on server hardware. ...

CSA Launches Best Practices for Mitigating Risks in Virtualized Environments

Published: 05/06/2015

At this year’s RSA Conference, the Cloud Security Alliance released a new whitepaper entitled: “Best Practices for Mitigating Risks in Virtualized Environments” which provides guidance on the identification and management of security risks specific to compute virtualization technologies that r...

CSA CloudBytes: May Webcast

Published: 05/06/2015

The Cloud Security Alliance CloudBytes webinar series is dedicated to educate the industry on the latest trends and topics in cloud computing. From regulation and risk in the cloud to the latest topics in IoT and data protection and privacy, we've reached thousands with our messages from top i...

Cloud Security Alliance Releases Candidate Mapping of FedRAMP Security Controls

Published: 05/05/2015

At the Cloud Security Alliance Federal Summit, the CSA announced the release of the Candidate Mapping V4 of the FedRAMP security controls to version 3.0.1 of the CSA Cloud Controls Matrix (CCM). The FedRAMP controls are based on the National Institute of Standards and Technology (NIST) Special...

OPEN PEER REVIEW: Privacy Level Agreement 4 Europe V2

Published: 04/28/2015

The Cloud Security Alliance would like to invite you to review and comment on the Privacy Level Agreement 4 Europe V2. The Cloud Security Alliance published in February 2013 the “Privacy Level Agreement Outline for CSPs Providing Services in the European Union” (PLA4EU V.1). The PLA4EU V.1 sho...

(ISC)²® and Cloud Security Alliance Introduce New Cloud Security Certification

Published: 04/21/2015

Rapid growth and adoption of cloud services increase demand for cloud security expertise RSA Conference, San Francisco, CA, April 21, 2015 — (ISC)²® (“ISC-squared”) and the Cloud Security Alliance® (CSA) today announced the new Certified Cloud Security Professional (CCSP) certification. The C...

Qualys CEO Philippe Courtot Receives the 2015 Industry Leadership Award from the Cloud Security Alliance

Published: 04/20/2015

Courtot Honored for His Industry Innovations and Support as a Founding Member of the Cloud Security Alliance SAN FRANCISCO, Calif. – RSA Conference USA 2015, Booth #N3421 - April 20, 2015 – The Cloud Security Alliance (CSA) has named Philippe Courtot, CEO of cloud security firm Qualys, Inc. (...

CSA STAR Registry Surpasses 100 Entries; New CSA STAR Watch Tool Now in Open Beta

Published: 04/20/2015

Cloud Providers Globally Seek to Meet Security Baselines Established by CSA San Francisco, CA – April 20, 2015 – The Cloud Security Alliance (CSA) today announced significant momentum for the CSA Security, Trust and Assurance Registry (STAR) program. CSA STAR is the industry’s comprehensive c...

CSA Launches New Security Guidance for Early Adopters of the IoT

Published: 04/20/2015

Cross-Industry Guidance Highlights Key Challenges and Recommended IoT Security Controls. These controls have been tailored to IoT-specific characteristics to allow early adopters to mitigate many of the risks associated with this new technology. San Francisco, CA – April 20, 2015 – The Cloud ...

Hot Legal Issues in the Cloud to Take Center Stage at Cloud Security Alliance Legal Information Seminar at RSA Conference 2015

Published: 04/09/2015

Representatives from California Department of Justice, Federal Trade Commission, IT Law Group, and MUFG Union Bank to Emphasize "An Ounce of Preparation is Better than a Pound of Damage Control" San Francisco, CA (RSA Conference 2015) – April 8, 2015 – The Cloud Security Alliance (CSA) today...

OPEN PEER REVIEW: Cloud Forensics Capability Maturity Model

Published: 04/09/2015

The Cloud Security Alliance would like to invite you to review and comment on the Cloud Forensics Capability Maturity Model. This document describes a process maturity model that can be used by both cloud consumers and cloud service provider’s (CSP’s) in assessing their process maturity in con...

Cloud Security Alliance to Host Third Software Defined Perimeter (SDP) Hackathon– Top Prize of $10,000 Available

Published: 04/07/2015

Participants Invited to Gain Access to Password Provided Account at RSA Conference; To Date No One Has Broken Alliance’s SDP Security Specification San Francisco, Calif. (RSA Conference Booth 2621) – April 7, 2015 - The Cloud Security Alliance (CSA), a not-for-profit organization which promot...

CSA Working Group Sessions at RSA

Published: 04/01/2015

CSA would like to invite members and other security professionals in San Francisco for RSA to working group sessions from CSA’s Research Portfolio. On Tuesday 4/21 from 9am-5pm, CSA will host and share updates to the following working groups: Cloud Data Governance Internet of Things Clou...

How To Address The BYOD Security Issue

Published: 03/26/2015

This proliferation of data that is now moving outside of company networks, down to things like employee-owned smartphones, tablets and laptops can increase the chance of data leaking out and getting into the wrong hands. This is perhaps why BYOD has become a huge pain point for professionals l...

OPEN PEER REVIEW: Security Guidance for Early Adopters of IoT

Published: 03/24/2015

The Cloud Security Alliance would like to invite you to review and comment on the Security Guidance for Early Adopters of the Internet of Things (IoT). This guidance discusses some of the challenges associated with the adoption of the IoT and concludes with a set of recommendations that can be...

Cloud Security Alliance Summit 2015 at RSA Conference To Spotlight Enterprise Lessons Learned at the Security Industry’s Largest Event

Published: 03/20/2015

Opening Keynote to Feature Philippe Courtot, Chairman & CEO of Qualys San Francisco, CA – March 20, 2015 – The Cloud Security Alliance (CSA) today announced the agenda for the CSA Summit 2015, being held at the RSA Conference on Monday, April 20 at Moscone Center West, Room 2014. This ye...

EMEA Congress 2015 CFP

Published: 03/19/2015

Cloud Security Alliance Opens Call for Presentations for EMEA Congress 2015 Berlin, Germany – March 18, 2015 - The Cloud Security Alliance (CSA) has opened the call for papers for the 2015 CSA EMEA Congress, to be held November 17-18th at the DBB Forum Berlin in Germany. CSA EMEA Congress is ...

Cloud Security Alliance: Insider Threat Survey

Published: 03/18/2015

The Cloud Security Alliance Cloud Data Governance Group is running a very short survey to better understand insider threat vectors and mitigating strategies for public cloud. I would be most appreciative if you could spend a few minutes taking the survey – there are 12 questions in total. Yo...

Looking for the CCM?

Start using the Cloud Controls Matrix to simplify compliance with multiple standards & regulations.