Cloud 101CircleEventsBlog
Register for CSA’s free Virtual Cloud Trust Summit to tackle enterprise challenges in cloud assurance.

All Articles

All Articles
How to Prepare Your Workforce to Secure Your Cloud Infrastructure with Zero Trust

Blog Published: 04/24/2024

Written by Martin Hall.As business reliance on cloud infrastructure has grown, attack surfaces have changed, vulnerabilities have increased, and the nature of threats continues to evolve. Zero Trust has become a pivotal framework to enhance the security of cloud infrastructure and services. Its f...

Upselling Cybersecurity: Why Baseline Security Features Shouldn’t Be a Commodity

Blog Published: 04/24/2024

Originally published by BARR Advisory. Written by Larry Kinkaid, Manager, Cybersecurity Consulting. When it comes to implementing and maintaining a strong cybersecurity posture within any organization, accountability is key. An information security program is only effective when controls—i.e., in...

Secure Your Kubernetes Environment by Enforcing Least Privilege

Blog Published: 04/24/2024

Originally published by Tenable. Written by Tom Croll, Advisor at Lionfish Tech Advisors. Kubernetes has emerged as the de facto standard for managing containerized workloads across private and public clouds. However, the evolution of security standards has significantly lagged, leading to heig...

AI Hallucinations: The Emerging Market for Insuring Against Generative AI's Costly Blunders

Blog Published: 04/23/2024

Written by MJ Schwenger, Co-Chair of the CSA AI Governance and Compliance Working Group.Generative AI: Embracing Hallucinations for Responsible InnovationThis blog delves into the fascinating world of Generative AI (GenAI), acknowledging its revolutionary potential while addressing the inherent c...

‘Leaky Vessels’ Docker Vulnerabilities Found in Many Cloud Environments: RunC (60%) and BuildKit (28%)

Blog Published: 04/23/2024

Originally published by Orca Security. Written by Roi Nisimi.On January 31st, Snyk unveiled the discovery of four novel container vulnerabilities that target the runC and BuildKit components within Docker container environments. The vulnerabilities were assigned CVEs with CVSS scores ranging from...

Neutralizing the Threat with Cloud Remediation

Blog Published: 04/23/2024

Originally published by Tamnoon. Written by Michael St.Onge, Principal Security Architect, Tamnoon. Smooth remediation requires meticulous coordination across tools, teams, and schedules. The complexity and scale of the remediation process may suggest that only a manual or an automated process ca...

Breach Debrief: The Fake Slackbot

Blog Published: 04/22/2024

Originally published by Adaptive Shield.Written by Hananel Livneh.Last month, The Verge reported on an amusing story of abusing Slack in a design, technology, science, and science fiction website. Tom McKay of IT Brew successfully hid on Slack after leaving the company in 2022 by assuming the per...

Understanding the Nuances: Privacy and Confidentiality

Blog Published: 04/22/2024

Originally published by MJD.Written by Shonda Knowles Elliott, CPA.In the digital age, where data is the new currency, businesses must prioritize the security and integrity of their clients' information. To demonstrate this, many organizations adhere to frameworks like SOC 2 (System and Organizat...

What’s in a Name? Defining Zero Trust for Leaders

Blog Published: 04/22/2024

Originally published by CXO REvolutionaries.Written by Nat Smith, Senior Director, Product Management, Zscaler.Could you accurately and succinctly describe zero trust to your leadership team or board? During my five years as a VP analyst at Gartner, I witnessed executives struggle to convey the c...

Do You Know These 7 Terms About Cyber Threats and Vulnerabilities?

Blog Published: 04/19/2024

In today's digitally interconnected world, where cybercriminals continue to advance as technology does, understanding the landscape of cyber threats and vulnerabilities is crucial for both individuals and organizations. Below, we define seven fundamental terms and provide additional resources tha...

Are You Ready for Microsoft Copilot?

Blog Published: 04/19/2024

Originally published by Reco.Written by Gal Nakash.On March 14, Microsoft made Copilot available to customers in their 365 environment. Originally designed to enable productivity, Copilot is an AI chatbot that allows any user to conduct research or create content. It has the ability to generate s...

Implementing a Data-Centric Approach to Security

Blog Published: 04/19/2024

Written by Uday Srinivasan, CTO, Acante.We previously discussed how the modern data stack has changed the threat landscape today. In part II, below, we outline exactly how security and data teams can enable modern data teams to innovate rapidly without compromising on the security and access gove...

Kernel Introspection from Linux to Windows

Blog Published: 04/18/2024

Originally published by Sysdig.Written by Nigel Douglas.The cybersecurity landscape is undergoing a significant shift, moving from security tools monitoring applications running within userspace to advanced, real-time approaches that monitor system activity directly and safely within the kernel b...

7 Common Causes of Data Breach: Safeguarding Your Digital Assets

Blog Published: 04/18/2024

Originally published by InsiderSecurity.Data Breaches are an ever-present threat to enterprises in today’s connected world. Whether you are a small SME or a large multinational company, the risk of a data breach and the company becoming another headline is a constant concern for senior management...

How to Set Your Small Privacy Team Up for Success

Blog Published: 04/17/2024

Originally published by Schellman.Amidst the evolving patchwork of data protection and privacy legislation in the United States, privacy remains a top priority for organizations. But protecting privacy also requires resources, and while not all organizations have that much to spare, it is possibl...

10 Tips to Guide Your Cloud Email Security Strategy

Blog Published: 04/17/2024

Originally published by Abnormal Security. Written by Lane Billings. As enterprises have migrated to Microsoft 365 and Google Workspace, they’ve seen the perks: easy collaboration, greater agility, and lower costs.But for most organizations, the challenge of determining how to keep data protected...

Cloud Security Alliance (CSA) AI Summit at RSAC to Deliver Critical Tools to Help Meet Rapidly Evolving Demands of AI

Press Release Published: 04/17/2024

Event to provide attendees with a holistic understanding of AI’s future along with pragmatic advice on managing risks and gaining benefits from generative AI SEATTLE – April 17, 2024 – This year, the Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, ...

The Widening Overlap Between Cloud Workloads and Cybersecurity

Blog Published: 04/17/2024

Written by David Balaban.There’s no denying that the cloud has revolutionized the way businesses operate, offering on-demand scalability, greater agility, and reduced IT infrastructure costs. To the average organization, a shift from on-prem to cloud-based is truly a quantum leap in terms of bene...

The Data Security Risks of Adopting Copilot for Microsoft 365

Blog Published: 04/16/2024

Originally published by Cyera.Written by Leo Reznik. Microsoft is taking the lead when it comes to AI-powered ecosystems. The company’s newly introduced Copilot AI assistant for Microsoft 365 surfaces organizational data to deliver users a seamless workflow experience. However, with lots of data ...

How to Audit Your Outdated Security Processes

Blog Published: 04/16/2024

Originally published by Vanta.As your business grows, there are new demands of the security team, like adding additional compliance frameworks, more security questionnaires, or new, advanced requirements from large enterprise customers.While this growth is exciting, it also comes with growing pa...

Looking for the CCM?

Start using the Cloud Controls Matrix to simplify compliance with multiple standards & regulations.