In the recent past CSA has defined the categories of security services that can be offered as Security as a Service....
Cloud Security Alliance Guidance on Security as a Service (SecaaS)
The CSA (Cloud Security Alliance) has issued a new guideance with a focus on how security can be provided as a service...
Cloud Computing = Low cost? Check again.
It is been considered that the cloud computing solutions reduces the cost of computing resources as far as...
Cloud Computing and Enterprise risk management
The number of organizations adopting clouding computing increases day by day. The COSO has published a thought paper...
Cloud Service brokerage
Many organizations source cloud services from different vendors which introduces various challenges to business...
Cloud solutions & PCI DSS Compliance
Businesses are increasing its dependence on cloud computing solutions. PCI DSS compliance is often a concern for many...
Google data center security
Found this interesting video in Youtube. It talks about the Google efforts on enforcing security across its data...
How long can CISO’s avoid Cloud Computing?
Cloud computing is gaining momentum in the business world. More and more business wants to increase their IT usage on...
NIST guide for managing cloud security and privacy
Cloud computing is gaining its popularity in an accelerated mode and many businesses and government entities are...
Cloud backup service . Risk and rewards
Cloud based services are on the rise. One of the service offered by a vendor is that it allows you to backup your data...
Cloud computing and Data security
Cloud computing is becoming a real trend in today.s business world. Businesses are increasingly opting for cloud based...
Data Protection and the Cloud
CA Technologies commissioned independent research in May 2011 to investigate the data protection and disaster recovery...
Top Cloud Security Threats Report
The Cloud Security Alliance (CSA) and HP have published new research findings that detail the potential threats...
Cloud Security vsTwitter Security Incident
The recent incident at the Twitter on the information leakage shall not be considered as a cloud security weakness....