Tag Archives: security alliance

Cloud Security Alliance Annual EMEA Congress Discussions

Cloud Security Alliance Annual EMEA Congress Discussions

Cloud Security Alliance Annual EMEA Congress Discussions It was as cloudy as Edinburgh could be in the autumn, when the “Cloud Security Alliance Annual EMEA Congress” featuring about 300 Cloud Computing stake-holders, gathered for the event that was held during the last week of September, produced By MISTI Europe. The variety of organizations participating demonstrated the…

CIAA: What Should Matter Most For Cloud Security

CIAA: What Should Matter Most For Cloud Security

CIAA: What Should Matter Most For Cloud Security Everyday there are more articles citing security as the top concern holding back public cloud adoption. While cloud means many things to different people, so does the term security. In discussions with business and industry experts, security concerns really boil down to the classic CIA—now CIAA—triad: confidentiality,…

Cloud Chivalry – Provider Pride

Cloud Chivalry – Provider Pride As cloud deployments gain popularity, increasing attention is paid to provider security strength. The cloud security alliance, for example, releases a yearly list of top threats, covering everything from malicious use, data loss, and service hijacking. Heightened public awareness of the cloud has led to oddly intuitive feelings of insecurity…

Cloud Infographic: Security And The Cloud 2012

Cloud Infographic: Security And The Cloud 2012

Cloud Infographic: Security And The Cloud 2012 When it comes to cloud computing, security is top-of-mind for each institution, public and private. In a recent study, defense contractor Lockheed Martin and its Cyber Security Alliance partners acquired feedback from government agencies in an effort to measure attitudes around cloud computing and cybersecurity. 85% of government technology decision…

Cybersecurity Act Of 2012 And The Cloud

Cybersecurity Act of 2012 and the Cloud Speaking of Laws and Regulations Governing the Cloud Computing Environment, we cannot ignore the latest cybersecurity bills proposed this year. There have been many cyber bills proposed, but none was as important as the Cybersecurity Act of 2012, supported by the Obama Administration. Cybersecurity is a top administration priority for…

Solving Problems On The Cloud Part 3: Overcoming Unhealthy Fixations

Solving Problems On The Cloud Part 3: Overcoming Unhealthy Fixations One example of an unhealthy fixation is the 2012 survey by Security Alliance who learned that the top threat listed by survey participants is data loss. Of course security risks on the cloud cannot be ignored but clearly this problem is hugely overstated. Why executives…

Cloud Infographic: The Rise Of The Cloud

Cloud Infographic: The Rise Of The Cloud

Cloud Infographic: The Rise Of The Cloud Findings from a joint Cloud Security Alliance (CSA) and ISACA survey show that government regulations, exit strategies and international data privacy dominate the Top 10 areas where confidence in the cloud is lowest. A collaborative project by ISACA and CSA, the Cloud Market Maturity study  provides business and…

Cloud Maturity Study Reveals The Top 10 Issues Eroding Cloud Confidence

Cloud Maturity Study Reveals The Top 10 Issues Eroding Cloud Confidence New Research by Cloud Security Alliance and ISACA Identifies Government Regulations, Exit Strategies, and International Data Privacy as Top Concerns Rolling Meadows, IL, USA (27 September 2012)—Findings from a joint Cloud Security Alliance (CSA) and ISACA survey show that government regulations, exit strategies and…

Popular

Top Viral Impact

Cloud Infographic: Disaster Recovery

Cloud Infographic: Disaster Recovery

Cloud Infographic: Disaster Recovery  Business downtime can be detrimental without a proper disaster recovery plan in place. Only 6% of businesses that experience downtime without a plan will survive long term. Less than half of all businesses that experience a disaster are likely to reopen their doors. There are many causes of data loss and…

Cloud Infographic – The Future Of Big Data

Cloud Infographic – The Future Of Big Data

Cloud Infographic – The Future Of Big Data Big Data is BIG business and will continue to be one of the more predominant areas of focus in the coming years from small startups to large scale corporations. We’ve already covered on CloudTweaks how Big Data can be utilized in a number of interesting ways from preventing world hunger to…

BYOD Will Continue To Define Workplaces In 2014

BYOD Will Continue To Define Workplaces In 2014

BYOD Will Continue To Define Workplaces In 2014 The bring-your-own-device trend has been the subject of scrutiny ever since its initial formation. Given how quickly personal smartphones and tablets became a fixture in everyday life, it makes perfect sense that these mobile machines would slip into workplaces. While BYOD has caused headaches for many businesses,…

The Future Of Work: What Cloud Technology Has Allowed Us To Do Better

The Future Of Work: What Cloud Technology Has Allowed Us To Do Better

The Future of Work: What Cloud Technology Has Allowed Us to Do Better The cloud has made our working lives easier, with everything from virtually unlimited email storage to access-from-anywhere enterprise resource planning (ERP) systems. It’s no wonder the 2013 cloud computing research IDG survey revealed at least 84 percent of the companies surveyed run at…

Cloud Infographic – What Is The Internet of Things?

Cloud Infographic – What Is The Internet of Things?

What Is The Internet of Things? “We’re still in the first minutes of the first day of the Internet revolution.”  – Scott Cook The Internet of Things (IOT) and Smart Systems are based on the notions of Sensors, Connectivity, People and Processes. We are creating a new world to view and measure anything around us through…

Whitepapers

Top Research Assets

Moving From Email Into The Cloud

Moving From Email Into The Cloud

Mobile Collaboration In The Cloud Imagine that you, as a manager, are told by the powers that be that you have to find “efficiencies” within your department that will result in one million dollars of savings annually. You struggle with this. You send an email to everyone on your senior team. “Where can we save…

IT Security: Think Like A Thief – And An Average Joe, Too

IT Security: Think Like A Thief – And An Average Joe, Too

IT Security: Think Like A Thief – And An Average Joe, Too With security threats to information services growing in sophistication, frequency and variety, IT professionals on all sides of the marketplace are realizing an urgent need to reinvent themselves to better anticipate the bewildering variety of attacks that they and their customers face. The…

Advertising Programs

Click To Find Out More!!

Sponsored Posts

Sponsored Posts

Advertising Package Options 2015 We have a dedicated readership, through our online, social media and email presence. Our goal is to continue to build our growing community, by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more. In order to do so, we require the support from businesses looking to generate more…

Contributors

Cloud Service Provider Selection Considerations

Cloud Service Provider Selection Considerations

Why Cloud Brokers Make Sense Different workloads perform differently on different cloud service providers. Enough so that it is prudent in planning to consider the optimal configuration and the optimal CSP for your solution. Consider this old word problem from years ago. One person can carry two buckets of water. It takes 5 minutes to…

Migrating to a Business Cloud (5 Warnings)

Migrating to a Business Cloud (5 Warnings)

Migrating to a Business Cloud  In theory, migrating to cloud computing should be easy. Choose a cloud provider, move the files to the data server and everything is good to go. While that may work for the personal cloud, migrating into a business cloud format is a lot more complicated. As Ann Bednarz pointed out…

5 Considerations You Need To Review Before Investing In Data Analytics

5 Considerations You Need To Review Before Investing In Data Analytics

Review Before Investing In Data Analytics Big data, when handled properly, can lead to big change. Companies in a wide variety of industries are partnering with data analytics companies to increase operational efficiency and make evidence-based business decisions. From Kraft Foods using business intelligence (BI) to cut customer satisfaction analysis time in half, to a…

CloudBuzz

Popular News Sources

Powerful New Cyber Espionage Program Said Discovered

Powerful New Cyber Espionage Program Said Discovered

An extremely sophisticated computer spying program called Regin has been spying on computers in Saudi Arabia, Russia, and other countries since at least 2008, security company Symantec says. Read the source article at WSJ Blogs

Health care welcomes the cloud, as resistance crumbles

Health care welcomes the cloud, as resistance crumbles

Not long ago, if I mentioned the word “public cloud” when visiting a health care company, I was likely to be walked politely off the property. The pushback came hard, to be kind. But I figured that once cloud computing became more proven and the world did not collapse as data was relocated to public…