Cloud 101CircleEventsBlog
Submit a Peer Review for the AI Controls Matrix—a groundbreaking framework to address AI risks and strengthen security.

All Articles

All Articles
Enhancing NIS2/DORA Compliance: A Business-Centric Approach

Blog Published: 01/16/2025

Originally published by Devoteam.Written by Kris Mandryk, Lead Consultant, Devoteam Belgium.The cybersecurity landscape is evolving with the arrival of the European Union’s NIS2 Directive and the Digital Operational Resilience Act DORA). These regulations elevate the standards for how organisatio...

AI-Generated Attacks Are Here. Zero Trust Is How We Fight Back.

Blog Published: 01/16/2025

Originally published by Illumio on December 9, 2024.Written by Raghu Nandakumara, Head of Industry Solutions, Illumio.Last month, I attended the Illumio World Tour stops in New York City and Sydney as well as Black Hat MEA. One topic dominated conversations: generative AI (GenAI) and its growing ...

Unlocking the Power of AI: An Intro to Prompt Engineering

Blog Published: 01/15/2025

Artificial Intelligence (AI) has become a cornerstone of innovation, transforming industries and reshaping how we interact with technology. At the heart of this revolution lies Large Language Models (LLMs)—AI systems designed to understand and generate human-like text.However, even the most advan...

The EU AI Act: A New Era of AI Governance Began August 1st

Blog Published: 01/15/2025

Originally published by Truyo.Written by Dan Clarke.The European Union’s AI Act, which entered into force August 1, 2024, marks a historic milestone as the world’s first comprehensive regulation for artificial intelligence. This groundbreaking legislation, initially agreed upon in December 2023, ...

Unpacking the LastPass Hack: A Case Study from CSA’s Top Cloud Threats Report

Blog Published: 01/15/2025

Originally published by InsiderSecurity.This article kicks off a series that explores prominent cybersecurity incidents, using CSA’s Top Threats to Cloud Computing report as a foundation. In this installment, we analyze the LastPass hack, offering a user-friendly, illustrated breakdown of the att...

Secrets & Non-Human Identity Security in Hybrid Cloud Infrastructure: Strategies for Success

Blog Published: 01/14/2025

Written by Itzik Alvas, Entro.Secrets & Non-Human Identities (NHIs) security in hybrid cloud environments is a critical challenge in today’s IT landscape. Passwords, API keys, certificates, and tokens are not just digital assets; they are the lifeblood of your organization’s security. Protect...

The Emerging Cybersecurity Threats in 2025 - What You Can Do To Stay Ahead

Blog Published: 01/14/2025

Contributed by Softchoice.Written by Abel E. Molina, Principal Architect, Security, Microsoft.As we look ahead to 2025, the landscape of cyber threats is evolving at a rapid pace, posing significant challenges for businesses, governments, and individuals. As the first blog of the year, I felt it ...

The Trouble with Large Language Models and How to Address AI “Lying”

Blog Published: 01/13/2025

Originally published by Schellman.Written by Avani Desai, CEO, Schellman.Even as AI systems become more advanced and enmeshed in daily operations, concerns regarding whether large language models (LLMs) are generating accurate and true information remain paramount throughout the business landscap...

Next-Gen Cybersecurity with AI: Reshaping Digital Defense

Blog Published: 01/10/2025

Written by Rahul Kalva.Abstract As the cyber threat landscape evolves, leveraging Artificial Intelligence (AI) has become imperative for creating robust, proactive defenses. AI's ability to detect, predict, and respond to threats in real-time sets it apart as a transformative force in cybersecur...

How to Secure Cloud Environments and Minimize Data Breach Risks

Blog Published: 01/10/2025

Originally published by Tenable. Written by Gad Rosenthal. The rapid shift to cloud computing has transformed how organizations manage and store their data. But as cloud adoption has grown, the risks have been heightened as well. Seeing opportunity, cybercriminals are increasingly targeting clou...

Let’s Go Back to the Basics: How ISO 27001 Certification Works

Blog Published: 01/09/2025

Written by Yehia (Ian) Ahmed, Complade.With cyber threats continually evolving, organizations across all sectors are increasingly pursuing ISO 27001 certification as a systematic framework for information security management and a robust assurance mechanism. ISO 27001 stands out as a universal st...

What is Protocol Break? A Deep Defense to Isolate Attackers in the Cloud

Blog Published: 01/09/2025

Originally published by Reemo.Written by Florent Paret.In today's digital landscape, marked by a proliferation of increasingly sophisticated cyberattacks, secure remote access to information systems has become a top priority. Protocol break, a technique that involves isolating systems by interrup...

Breaking Into the U.S. Market: Cybersecurity Compliance to Fuel International Growth

Blog Published: 01/08/2025

Originally published by BARR Advisory.Expanding into the U.S. market offers Europe-based cloud service providers (CSPs) exciting new growth opportunities—but cybersecurity standards aren’t exactly the same across the pond. For security leaders who are used to GDPR and other European frameworks, i...

Adapting Strong IAM Strategies to Combat AI-Driven Cyber Threats

Blog Published: 01/08/2025

Written by Jordi Vilanova, Cloudtango.In early 2024, T-Mobile experienced a significant data breach where attackers exploited weak IAM controls to gain access to the personal information of over 30 million customers. The attackers used a combination of phishing attacks and stolen credentials to b...

Your Essential 10-Step GDPR Compliance Checklist

Blog Published: 01/07/2025

Originally published by Vanta.Written by Jess Munday.If your business entails collecting and/or processing the personal data of European Union (EU) or United Kingdom (UK) citizens, complying with the General Data Protection Regulation (GDPR) is a priority.‍The regulation is quite comprehensive an...

Navigating Cloud Challenges with Repatriation

Blog Published: 01/07/2025

Written by Rajesh Awasthi, VP & Global Head of Managed Hosting and Cloud Services, Tata Communications.Originally published by DQ India.Cloud computing has transformed business operations with its scalability, flexibility, and cost-efficiency, encouraging organisations to modernise their IT i...

Lanes in the Road: How Small and Medium Businesses Can Allocate Cybersecurity Responsibility

Blog Published: 01/06/2025

Originally published by Scrut Automation.Written by Nicholas Muy, Chief Information Security Officer, Scrut Automation.After suffering a devastating ransomware attack in early 2023, the law firm Mastagni Holstedt turned around and sued its Managed Service Provider (MSP), LanTech. While the legal ...

Global Data Sovereignty: A Comparative Overview

Blog Published: 01/06/2025

Written by Thales.In a cloud-driven world where data is stored off-premises and distributed across global servers, the question of who controls data is complex. Maintaining control over data becomes increasingly crucial for businesses as data grows in value. This concern gave rise to the concept ...

Enhancing Salesforce Security: Beyond Built-in Features

Blog Published: 01/03/2025

Written by Itzik Alvas, CEO, Entro Security.Salesforce, the world’s leading CRM platform, boasts over 230,000 customers globally and dominates with a 20% market share. Organizations flock to Salesforce for its proven ability to drive results, reporting an average revenue growth of 25% annually an...

The Rise of Malicious AI: 5 Key Insights from an Ethical Hacker

Blog Published: 01/03/2025

Originally published by Abnormal Security.Written by Jade Hill.Artificial intelligence has become prevalent in nearly every industry worldwide over the last two years, and cybercrime is no exception. While the cybersecurity industry is focused on how to use AI to stop bad actors, those cybercrimi...

Looking for the CCM?

Start using the Cloud Controls Matrix to simplify compliance with multiple standards & regulations.