background preloader

Cloud Security Alliance

Cloud Security Alliance
April 02, 2014 Cloud Security Alliance (CSA) Announces SAP Has Joined CSA as an Executive Corporate Member SAP will participate in key research with the CSA on Horizon 2020 – the EU framework programme for research and innovation. April 01, 2014 SIT Partners The Cloud Security Alliance In Landmark Agreement SIT students will have the opportunity to participate in CSA events in Asia Pacific, and will be given priority placements to work with CSA during the course of their studies.

Related:  RIC - shared fileInformation Technologybksubbarao

ISO/IEC 27017 cloud security Introduction This standard will provide guidance on the information security elements of cloud computing, recommending and assisting with the implementation of cloud-specific information security controls supplementing the guidance in ISO/IEC 27002 and indeed other ISO27k standards including ISO/IEC 27018 on the privacy aspects of cloud computing, ISO/IEC 27031 on business continuity, and ISO/IEC 27036-4 on relationship management, as well as all the other ISO27k standards. Scope and purpose

How To Contribute How can I help? Thanks for asking. Let's find a place for you! First you should join our communication forums: Subscribe to our mailing lists Join us on IRC: You can talk to us directly in one of the #openstack channels Answer and ask questions on Ask OpenStack If you're building clouds

Classifica dei migliori servizi cloud divisi per categoria Are you able to export your data in an interoperable, portable format? (Yes/No)Cost to do so (The higher the cost the lower the score)Time and number of actual steps in the process it takes to do so (The more time and steps, the lower the score)Overall ease/difficulty of the process (The more difficult, the lower the score) Take a look at the rankings below and let us know what you think. Do any of the rankings surprise you?

Jericho Forum Current Activities When the Jericho Forum sunset on 21 Oct 2013, it had five documents developed as part of its 2013 work program that were nearing final draft status and ready for formal Open Group review leading to publication. These five documents were transitioned into the Security Forum as work-in-progress, so from Nov2013 through Jan21014 the Jericho Forum WG was fully engaged in finalizing them and supporting their progress through formal review to publication: On completion of this activity, no further specific Jericho WG development work is currently planned. What was the Jericho Forum? In October 2013, after a decade of achievements targetting this mission, the Jericho Forum leaders considered that day had now arrived, because de-perimeterisation an established "fact" touching all areas of modern business - it is widely understood and quoted by the entire computing industry.

Javascript Cheat Sheet Basic Objects Math Methods DOM Events Event Object Constant Top five cloud computing security issues In the last few years, cloud computing has grown from being a promising business concept to one of the fastest growing segments of the IT industry. Now, recession-hit companies are increasingly realising that simply by tapping into the cloud they can gain fast access to best-of-breed business applications or drastically boost their infrastructure resources, all at negligible cost. But as more and more information on individuals and companies is placed in the cloud, concerns are beginning to grow about just how safe an environment it is.

bigdata: All content tagged as bigdata in NoSQL databases and polyglot persistence Building on the same data coming from Gartner and a talk from Hadoop Summit (exactly the same), Matt Asay and Timo Elliott place Hadoop on the data warehouse map. Matt Asay writes in the ReadWrite article that Hadoop is not replacing existing data warehouses, but it’s taking all new projects: Hadoop (and its kissing cousin, the NoSQL database) isn’t replacing legacy technology so much as it’s usurping its place in modern workloads. This means enterprises will end up supporting both legacy technology and Hadoop/NoSQL to manage both existing and new workloads […]Of course, given “the effective price of core Hadoop distribution software and support services is nearly zero” at this point, as Jeff Kelly highlights, more and more workloads will gravitate to Hadoop. So while data warehouse vendors aren’t dead—they’re not even gasping for breath—they risk being left behind for modern data workloads if they don’t quickly embrace Hadoop and other 21st Century data infrastructure. No.

TA-SWISS - Cloud Computing Introduction | Procedure | Results / Downloads | Contacts Introduction What do we mean by Cloud Computing?Cloud Computing is a concept which describes the virtualisation of IT infrastructures, namely the provision, via networks, of computing capacity, memory units (Infrastructure as a Service, IaaS), programs (Software as a Service, SaaS) and programming environments (Platform as a Service, PaaS). UDDI Version 3.0.2 UDDI Version 3.0.2 UDDI Spec Technical Committee Draft, Dated 20041019 Document identifier: uddi_v3

Cloud Computing Has Become a Dominant Force in Financial Services Cloud computing is emerging as a dominant force in the financial services industry, and investment banks, brokers, market makers and asset managers all will look to push more sophisticated applications into the private cloud, according to Options IT CEO Nigel Kneafsey. In the span of a few short years, cloud computing has gone from being an enigmatic and somewhat exotic technology management model to a dominant force that is changing how business heads relate to and value the underlying technology that supports business growth. In the financial markets in particular, the implications of cloud computing on the business, however, have been neither clearly defined by the service provider nor clearly understood by the average consumer. Admittedly, early descriptions and definitions of cloud computing often relied on metaphors and analogies rather than concrete terms and value propositions. The Rise of Financial Clouds

Call for papers Context and Scope Cloud Computing promises to deliver computational resources on demand as services that are commoditised and delivered as in traditional utilities such as electricity, gas, water and telephony. Utility with Cloud services can already be achieved for compute, storage and communication resources but also for hosted software and data. UCC is the premier IEEE/ACM conference covering all areas related to Cloud Computing as a Utility. There is also increasing interest from commercial providers to offer business and revenue models around the services they offer. Understanding how these model could be used to provide utility for both users, intermediary brokers (aggregators) and providers will also be of interest for this conference. Five free apps for dealing with hardware problems Although computer hardware has become something of a commodity item, there are still situations that require troubleshooting. Fortunately, a number of free utilities can help you with the process. This article discusses five good choices. Note: This article is also available as an image gallery and a video hosted by TechRepublic columnist Tom Merritt. 1: 3DP Chip

The (Cloud) Tipping Point Trusted financial services vendors are grabbing the cloud market away from the Amazons and Googles of the cloud world. While consumers have been quick to move to cloud-based services and technology, the financial industry, collectively, has been one of the slower adopters. Until now. Pressured by mounting costs, increasing regulation and stringent e-discovery requirements, financial firms are quickly transitioning from in-house archiving and compliance solutions to hosted solutions, according to a study from Forrester Consulting and commissioned by Bloomberg Vault, a service that helps corporations meet compliance, regulatory and e-discovery requirements. Resources - Carpathia, Inc. Compliance & Accreditations Carpathia solutions have been engineered with compliance in mind. This isn’t an afterthought; it’s in the DNA of everything we do. Carpathia’s Compliant Hosting Platform (CCHP) has evolved with each iteration of NIST standards and federal requirements, delivering compliance across FedRAMP, FISMA, DIACAP, HIPAA, SOX and PCI, among others. We have oriented our entire business model around delivering infrastructure, services, policies and procedures that meet and exceed commercial, federal and Department of Defense (DoD) compliance mandates. The certification landscape is continuously evolving.

Related:  Cloud services