Cloud Security Alliance Launches Mobile, Innovation Initiatives

The Cloud Security Alliance (CSA) recently announced two significant new initiatives for 2012, addressing growing areas of need in cloud security -- mobile computing and innovation. CSA’s initiatives in these areas will focus on accelerating delivery of a trusted cloud ecosystem, furthering the organization’s mission to promote the use of best practices for providing security assurance within Cloud Computing, and to provide education on the uses of Cloud Computing to help secure all other forms of computing.

“Our active, lively group of more than 30,000 members fosters great discussion on a daily basis, and it’s clear there is demand for additional guidance and thought leadership in the areas of mobility and innovation,” said Jim Reavis, co-founder and Executive Director of the CSA. “We have listened to the challenges that both practitioners and innovators face, and we are excited to begin work in these crucial new areas.”

Innovation Initiative

The traditional market has produced inadequate information security for users of Cloud Computing. In addition, innovators must navigate a highly inefficient system to reach customers, gain access to capital, and develop “built in”, not “bolted on” security integration across all of their solutions. The CSA Innovation Initiative (CSA-II) aims to accelerate delivery of a trusted cloud ecosystem through the following:

  • Identify key structural issues related to trust and security that will inhibit the adoption of next generation information technology.
  • Articulate the guiding principles and objectives that IT innovators must address.
  • Incubate technology solutions that align with our principles and address the systemic gaps we have identified.

“Startup or big company, you will significantly benefit from this initiative,” said Jim Kaskade, EIR at PARC, a Xerox Company. “Just think of the value when you can take breakthrough ideas into a specialized security curriculum with mentorship from leaders in the industry. Then add capital resources, infrastructure, and access to early customer funnel. This will make a huge impact.”

“The rapid growth in cloud computing has far outpaced the measures many enterprises have put in place to protect their sensitive data in the cloud, and opened up a new set of unique challenges concerning data privacy and residency due to inadequate control and visibility,” said Pravin Kothari, Founder and CEO of CipherCloud. “The CSA Innovation Initiative is a catalyst that will encourage such innovation to protect enterprise data in the cloud, address security concerns, and accelerate cloud adoption."

The initiative will comprise both a working group within the CSA, as well as a for–profit entity working with innovators and other stakeholders. Innovators can develop relevant solutions with or without CSA assistance, and then request that the CSA-II working group assesses the value of the solution within the community. The CSA-II working group will also recommend resources to innovator, to help meet the challenges mentioned above. For more information, visit www.cloudsecurityalliance.org/innovate.

Mobile Computing Initiative

Mobile computing is experience tremendous growth, while the devices are gaining significant power and capabilities. Personally owned mobile devices are increasingly being used to access employers systems and clouds of mobile devices are likely to be common. The CSA Mobile working group will be responsible for providing fundamental research to help secure mobile endpoint computing from a cloud-centric point of view, and is chartered to research the following areas:

  • Securing application stores and other public entities deploying software to mobile devices
  • Cloud-based management, provisioning, policy, and data management of mobile devices to achieve security objectives
  • Guidelines for the mobile device security framework and secure mobile cloud architectures
  • Best practices for secure mobile application development
  • Resolving multiple usage roles, e.g. personal and business use of a common device

“Mobile devices are the newest generation of communication and it’s nearly impossible to separate mobile technology from cloud solutions,” said David Lingenfelter, Information Security Officer for Fiberlink. “Making sure that security is an integral part of mobile technology can only be done by making sure that security in the cloud takes into account every aspect of mobile computing and this new working group will help bring those two worlds into alignment.”

“When diverse stakeholders come together to support a common objective, useful information is generated and exchanged. The development of the CSA Mobile Working Group is pivotal to identifying, developing, sharing industry and expert knowledge to support global adoption for implementation of the dynamic characteristics associated with integrating security of mobile cloud computing endeavors,” said Pamela Fusco, Principal, Booz Allen Hamilton.

"Mobile technology isn't just complementary to cloud; it is a forcing function for cloud adoption that brings a number of unique security challenges,” said K. Scott Morrison, CTO and Chief Architect, Layer 7 Technologies. “The CSA has been very successful defining the best practices for cloud security, making it the logical choice to help secure the new triangle of mobile, cloud and enterprise."

Featured

  • New Report Reveals Top Trends Transforming Access Controller Technology

    Mercury Security, a provider in access control hardware and open platform solutions, has published its Trends in Access Controllers Report, based on a survey of over 450 security professionals across North America and Europe. The findings highlight the controller’s vital role in a physical access control system (PACS), where the device not only enforces access policies but also connects with readers to verify user credentials—ranging from ID badges to biometrics and mobile identities. With 72% of respondents identifying the controller as a critical or important factor in PACS design, the report underscores how the choice of controller platform has become a strategic decision for today’s security leaders. Read Now

  • Overwhelming Majority of CISOs Anticipate Surge in Cyber Attacks Over the Next Three Years

    An overwhelming 98% of chief information security officers (CISOs) expect a surge in cyber attacks over the next three years as organizations face an increasingly complex and artificial intelligence (AI)-driven digital threat landscape. This is according to new research conducted among 300 CISOs, chief information officers (CIOs), and senior IT professionals by CSC1, the leading provider of enterprise-class domain and domain name system (DNS) security. Read Now

  • ASIS International Introduces New ANSI-Approved Investigations Standard

    • Guard Services
  • Cloud Security Alliance Brings AI-Assisted Auditing to Cloud Computing

    The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment, today introduced an innovative addition to its suite of Security, Trust, Assurance and Risk (STAR) Registry assessments with the launch of Valid-AI-ted, an AI-powered, automated validation system. The new tool provides an automated quality check of assurance information of STAR Level 1 self-assessments using state-of-the-art LLM technology. Read Now

  • Report: Nearly 1 in 5 Healthcare Leaders Say Cyberattacks Have Impacted Patient Care

    Omega Systems, a provider of managed IT and security services, today released new research that reveals the growing impact of cybersecurity challenges on leading healthcare organizations and patient safety. According to the 2025 Healthcare IT Landscape Report, 19% of healthcare leaders say a cyberattack has already disrupted patient care, and more than half (52%) believe a fatal cyber-related incident is inevitable within the next five years. Read Now

New Products

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings.

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening.

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.