Cloud Security Alliance
![cloud](https://img.helpnetsecurity.com/wp-content/uploads/2018/10/09095945/cloud2-400x200.jpg)
The security challenges of managing complex cloud environments
Holistic cloud visibility and control over increasingly complex environments are essential for successful deployments in various cloud scenarios, a Cloud Security Alliance and …
![cloud](https://img.helpnetsecurity.com/wp-content/uploads/2018/10/09095943/cloud-400x200.jpg)
CSA launches compliance assessment program for cloud service providers
The Cloud Security Alliance (CSA) announced STAR Continuous Self Assessment, the first release of an evolving continuous-compliance assessment program for cloud services that …
![business](https://img.helpnetsecurity.com/wp-content/uploads/2018/05/09101202/business-400x200.jpeg)
Most organizations are migrating data for ERP apps to the cloud
According to a Cloud Security Alliance survey, 69 percent of organizations are migrating data for popular ERP applications to the cloud, moving to major cloud …
![](https://img.helpnetsecurity.com/wp-content/uploads/2018/04/09101313/cio-ciso-exchange-courtot-400x200.jpg)
Photo gallery: CIO/CISO Interchange inaugural event
CIO/CISO Interchange, a new non-profit, non-commercial organization co-founded by Philippe Courtot, Chairman & CEO, Qualys, and the Cloud Security Alliance (CSA) was …
![abstract](https://img.helpnetsecurity.com/wp-content/uploads/2017/01/09105427/abstract-400x200.jpg)
New infosec products of the week: June 9, 2017
Absolute expands its self-healing endpoint security and compliance solutions for Android devices Absolute expands its support for Android to provide uncompromised visibility …
![Car](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09110903/car-green2-400x200.jpg)
Guidance for connected vehicle security: Attack vectors and impacts
The Cloud Security Alliance (CSA) released its first ever research and guidance report on connected vehicle security. Authored by the CSA’s Internet of Things (IoT) …
![architecture](https://img.helpnetsecurity.com/wp-content/uploads/2017/02/09105023/architecture-400x200.jpg)
Key obstacles to digital transformation and data privacy compliance
To stay relevant in an increasingly digital world, companies are either starting to or are currently in the process of transforming their digital environment to improve …
![San Francisco](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09114030/san_francisco_california-400x200.jpg)
Securing the converged cloud: CSA Summit at RSA Conference 2017
The Cloud Security Alliance (CSA) announced the agenda for its annual CSA Summit 2017, a full-day event being held at the RSA Conference 2017 on Monday, February 13, 2017. …
![Technology](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195352/general_monitor-400x200.jpg)
New infosec products of the week: November 18, 2016
ThreatQuotient delivers threat intelligence platform for threat operations and management ThreatQ v2 has transformed the threat intelligence platform into a powerful …
![Internet of Things](https://img.helpnetsecurity.com/wp-content/uploads/2016/10/09110332/iot-400x200.jpg)
Steps to developing secure IoT products
IoT is broad ranging, and the pace of change and innovation is fast. This makes identifying controls that can be applied against diverse IoT products difficult. Recently, much …
![CSA book](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09110837/csa-book-400x200.jpg)
100 best practices in Big Data security
The Cloud Security Alliance (CSA) released the new handbook from the CSA Big Data Working Group, outlining the 100 best practices in Big Data security. The Big Data Security …
![cloud](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09111038/cloud-400x200.jpg)
Should cloud vendors cooperate with the government?
More than one in three IT pros believe cloud providers should turn over encrypted data to the government when asked, according to Bitglass and the Cloud Security Alliance …
Featured news
Sponsored
Don't miss
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD