Versioning in Cloud Environments: How it Can Cause Shadow Data & How to Mitigate the Risk
Blog Published: 06/20/2023
Originally published by Laminar. Versioning in AWS S3 buckets, Azure Blob Containers and Google Cloud buckets is an extremely useful data management tool, and is even considered “best practice” when storing and managing data in the cloud. When enabled, this feature keeps multiple versions of a...
How Can Busy CISOs Avoid Occupational Burn-Out?
Blog Published: 06/20/2023
Originally published by TrueFort. How to avoid burning out at work if you’re a busy CISOAs Chief Information Security Officer (CISO), you are responsible for securing your organization’s sensitive data and systems. The job can be demanding and stressful, with long hours, tight security budgets...
How to Manage Risks in Cloud Environments
Blog Published: 06/20/2023
Originally published by BigID. Written by Tyler Young. For the last decade, organizations have been planning to – or already have – moved all of their data to the cloud. On the surface cloud computing sounds great: lower operating costs, endless geographical deployments, and exponential comput...
How ChatGPT Can Be Used in Cybersecurity
Blog Published: 06/16/2023
ChatGPT is a large language model trained by OpenAI. Due to the massive amount of data it was trained on, it can understand natural language and generate human-like responses to questions and prompts at a truly impressive level. New use cases for ChatGPT are developed every day. In this blog, ...
Cloud Security Alliance Announces Cloud Controls Matrix (CCM) Update, Mapping to National Institute of Standards and Technology’s (NIST) Cybersecurity Framework v1.1
Press Release Published: 06/20/2023
Mapping identifies areas of equivalence, gaps, and misalignment between CCM and NIST standardsSEATTLE – June 20, 2023 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications and best practices to help ensure a secure cloud computing...
Perspectives on AI: A Conversation with Torq's CTO
Blog Published: 06/22/2023
This interview with Leonid Belkind, Co-Founder & CTO, Torq, is the first in a series of many conversations with experts operating at the nexus of artificial intelligence and cybersecurity. AI seems to be the top boardroom topic today according to my network. Heavily hyped topics often conf...
Overcome Cloud Migration Challenges with Professional Cloud Services
Blog Published: 06/27/2023
Originally published by Sangfor Technologies. Written by Nicholas Tay Chee Seng, CTO, Sangfor Cloud. Cloud Migration Challenges are Showstoppers for Cloud Adoption Cloud computing is a major driver of digital transformation. The global cloud computing market is expected to grow from USD$272 ...
Launching a Corporate SaaS Security Program
Blog Published: 06/28/2023
Originally published by Obsidian Security. Written by Kelsey Brazill. As organizations increasingly rely on SaaS applications to conduct business, the importance of a thorough SaaS security program cannot be overstated for protecting the business and its sensitive data. Over 30% of bus...
CISA’s Cyber Performance Goals for Better Security
Blog Published: 06/28/2023
Originally published by Orca Security. Written by Doug Hudson. Last year, the Cybersecurity and Infrastructure Security Agency (CISA) released its 2022 Cross-Sector Cybersecurity Performance Goals in order to provide guidance for improving cybersecurity across government and private se...
Growing Your Revenue with Card-on-File Tokenization
Blog Published: 06/29/2023
Originally published by TokenEx. Written by Anni Burchfiel. Keeping customer card information on file has a lot of benefits, but many companies are rightfully concerned about the potential security issues storing card information can create. After all, any security breach could reveal cardhold...
Five Qualities That Make for a Great vCISO
Blog Published: 06/21/2023
Originally published by CXO REvolutionaries. Written by Brad Schaufenbuel, VP and CISO, Paychex. The chief information security officer is typically the apex of a career in cybersecurity. Some hold the same title as they move from one company to the next. Other CISOs find their way to differen...
Are You Evaluating Your Target Acquisition Through the Cyber Security Lens?
Blog Published: 06/21/2023
Originally published by NCC Group. Written by Sourya Biswas, Technical Director, NCC Group. Caveat emptor, Latin for “Let the buyer beware,” is the principle that the buyer alone is responsible for checking the quality and suitability of goods before a purchase is made. It is traditionally roo...
Movin’ Out: Identifying Data Exfiltration in MOVEit Transfer Investigations
Blog Published: 06/28/2023
Originally published by CrowdStrike. Summary Points Organizations around the globe continue to experience the fallout of the MOVEit Transfer exploit CVE-2023-34362 CrowdStrike incident responders have identified evidence of mass file exfiltration from the MOVEit application, as a result of the...
A Catastrophic Cyber Event in the Next Two Years. Are You Ready?
Blog Published: 06/23/2023
Originally published by Avanade. Written by Rajiv Sagar. Over the last few years, cybersecurity has become a board-level imperative. Geopolitical instability, ongoing military conflicts, and a wide-spread economic downturn, have all increased cybersecurity threats, which need to be tackled rap...
Three Cloud Security Use Cases Best Solved With Cloud Governance
Blog Published: 06/26/2023
Originally published by Secberus. Written by Fausto Lendeborg. Maybe you’re migrating to the cloud and about to hire a System Integrator, maybe you’ve recently merged with another business or company and have no idea what’s actually in your cloud, or maybe you are drowning in false positives w...
Cloud Security Threats to Watch Out for in 2023: Predictions and Mitigation Strategies
Blog Published: 06/29/2023
Written by Ashwin Chaudhary, CEO, Accedere. As we move forward into the future, cloud computing is expected to become even more universal. With that comes an increased risk of cyber threats that could compromise sensitive data, systems, and networks. Here are some predictions on some of the mo...
Strong Winds Behind Financial Service Adoption of Cloud (As Long as We Stay Between the Buoys)
Blog Published: 06/27/2023
This month we released the findings from our research into the current use of cloud services by financial service organizations and the data suggests a growing comfort with leveraging the technology to manage critical workloads. In fact, 98% of respondents said their financial company is using...
Unmasking SaaS Security: Illuminating Insights from the Adaptive Shield-CSA Survey 2023
Blog Published: 06/28/2023
In the increasingly digitalized world, Software as a Service (SaaS) applications play a pivotal role in businesses of all sizes. As these applications become increasingly important so too does the security. This is the basis for Adaptive Shield and CSA's joint annual survey, providing crucial ...
Mastering Kubernetes Security: Navigating Complexity and Securing Your Cloud Native Architecture
Blog Published: 06/29/2023
Originally published by Tenable. Written by Shantanu Gattani. Demystifying Kubernetes security is paramount for cloud security teams in today's landscape. As organizations increasingly adopt Kubernetes for their container deployments, understanding Kubernetes’ unique security challenges and ...
Insider Threats to the Healthcare Industry
Blog Published: 06/30/2023
Originally published by Coalfire. Written by Ian Walters, Principal, Thought Leader, Coalfire. A discussion of insider threats faced by the U.S. healthcare industry highlighting the types of threats and recommendations on how organizations can mitigate the risks. Key takeaways:Identifying exam...