Cloud Security Alliance
![Desk](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09112959/desk_type-400x200.jpg)
Compromised credentials still to blame for many data breaches
Compromised credentials are still the cause of almost a quarter of all data breaches, according to the Cloud Security Alliance (CSA). Data breaches, account hijacking and …
![cloud threats](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113927/cloud-threats-400x200.jpg)
Top 12 cloud computing threats in 2016
The Cloud Security Alliance (CSA) Top Threats Working Group released at RSA Conference an important new research report about cloud computing threats, developed to serve as an …
![RSA Conference](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194507/rsaconference2015-presentation-400x200.jpg)
Cloud Security Alliance hackathon offers $10,000 prize
The Cloud Security Alliance (CSA) will hold its fourth hackathon at the RSA Conference 2016 in San Francisco, to continue to test the CSA Software Defined Perimeter (SDP) …
![Cloud](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195223/cloud_sky-400x200.jpg)
Shift in strategy around cloud adoption and security
Cloud adoption does not have to mean opening up your organization to increased security risks and threats if the right policies are in place, according to a new CSA survey. …
Why cloud business continuity is critical for your organization
Business continuity, the ability of a company to continue or quickly restart operations following a systems outage, tends to be a topic overlooked by business leaders. Many …
What a business leader should know about the cloud and its impact
Great companies see business risks as opportunities, and execute strategies accordingly. Such a mentality is compatible with emerging technologies. IT plays a vital role in …
CSA releases tool for personal data legal protection
At Infosecurity Europe 2015, the Cloud Security Alliance (CSA) Privacy Level Agreement (PLA) Working Group released the Privacy Level Agreement (PLA) v2, a tool that provides …
![RSA Conference 2015](https://img.helpnetsecurity.com/wp-content/uploads/2015/04/09194710/rsaconference_2015-people2-400x200.jpg)
New cloud security certification from (ISC)2 and CSA
Today, at the RSA Conference 2015, (ISC)2 and the CSA announced the new Certified Cloud Security Professional (CCSP) certification. The CCSP represents the advanced skills …
![cloud binary](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09194831/cloud_binary-400x200.jpg)
CSA to hold hackathon featuring $10,000 prize
The Cloud Security Alliance (CSA) will hold its third Hackathon at the RSA Conference 2015 in San Francisco, to continue to test the CSA Software Defined Perimeter …
![Qualys](https://img.helpnetsecurity.com/wp-content/uploads/2015/04/09194718/qualys-blue-400x200.jpg)
Qualys experts and customers to present security best practices at RSA Conference 2015
The Qualys CEO Philippe Courtot will deliver the opening keynote presentation at CSA Summit during RSA Conference 2015. The keynote discusses how the cloud has forced …
Financial firms are putting more stock in the cloud
Many financial firms are slowly putting more stock in the cloud. That’s a key finding from a new Cloud Security Alliance (CSA) survey, which targeted executives from …
Security of data in the cloud now an executive-level concern
The Cloud Security Alliance (CSA) surveyed more than 200 IT and security professionals, and nearly 72 percent admitted that they did not know the number of shadow IT apps …
Featured news
Sponsored
Don't miss
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD