Cloud Security Alliance

Photo gallery: CIO/CISO Interchange inaugural event
CIO/CISO Interchange, a new non-profit, non-commercial organization co-founded by Philippe Courtot, Chairman & CEO, Qualys, and the Cloud Security Alliance (CSA) was …

New infosec products of the week: June 9, 2017
Absolute expands its self-healing endpoint security and compliance solutions for Android devices Absolute expands its support for Android to provide uncompromised visibility …

Guidance for connected vehicle security: Attack vectors and impacts
The Cloud Security Alliance (CSA) released its first ever research and guidance report on connected vehicle security. Authored by the CSA’s Internet of Things (IoT) …

Key obstacles to digital transformation and data privacy compliance
To stay relevant in an increasingly digital world, companies are either starting to or are currently in the process of transforming their digital environment to improve …

Securing the converged cloud: CSA Summit at RSA Conference 2017
The Cloud Security Alliance (CSA) announced the agenda for its annual CSA Summit 2017, a full-day event being held at the RSA Conference 2017 on Monday, February 13, 2017. …

New infosec products of the week: November 18, 2016
ThreatQuotient delivers threat intelligence platform for threat operations and management ThreatQ v2 has transformed the threat intelligence platform into a powerful …

Steps to developing secure IoT products
IoT is broad ranging, and the pace of change and innovation is fast. This makes identifying controls that can be applied against diverse IoT products difficult. Recently, much …

100 best practices in Big Data security
The Cloud Security Alliance (CSA) released the new handbook from the CSA Big Data Working Group, outlining the 100 best practices in Big Data security. The Big Data Security …

Should cloud vendors cooperate with the government?
More than one in three IT pros believe cloud providers should turn over encrypted data to the government when asked, according to Bitglass and the Cloud Security Alliance …

Compromised credentials still to blame for many data breaches
Compromised credentials are still the cause of almost a quarter of all data breaches, according to the Cloud Security Alliance (CSA). Data breaches, account hijacking and …

Top 12 cloud computing threats in 2016
The Cloud Security Alliance (CSA) Top Threats Working Group released at RSA Conference an important new research report about cloud computing threats, developed to serve as an …

Cloud Security Alliance hackathon offers $10,000 prize
The Cloud Security Alliance (CSA) will hold its fourth hackathon at the RSA Conference 2016 in San Francisco, to continue to test the CSA Software Defined Perimeter (SDP) …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility