Learn Zero Trust Principles and Strategy: CSA’s Zero Trust Training Program
Blog Published: 08/28/2023
We first heard the rumblings of Zero Trust (ZT) in the early 2000s, but only in the last few years has it truly taken off and entered the cybersecurity zeitgeist. CSA’s Zero Trust training series will give you the knowledge and skills necessary to actually implement a ZT strategy and reduce sy...
Cloud Security Alliance Survey Finds Complexity of Multi-cloud Environments Driving Use of Cloud Native Application Protection Platforms
Press Release Published: 08/24/2023
Platforms have emerged as critical security tool due to their ability to consolidate the capabilities of many security tools currently deployed by organizationsSEATTLE – Aug. 24, 2023 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifi...
Zero Trust and AI: Better Together
Blog Published: 08/24/2023
Written by Chris Hogan, Vice President, Enterprise Security Architecture and Innovation, Mastercard. For the better part of 2023, the spotlight has been captured by the strides of Artificial Intelligence (AI) and the increased availability of Generative AI (GenAI). Several organizations that w...
Common Mistakes Businesses Make When it Comes to PCI Compliance and Guidance on How to Avoid Them
Blog Published: 08/28/2023
Originally published by CyberGuard Compliance. Written by Eric Hilden. Payment Card Industry Data Security Standard (PCI DSS) compliance is essential for businesses that handle credit card information. Compliance with PCI DSS ensures that businesses maintain a secure environment for cardholder...
Machine Learning for Threat Classification
Blog Published: 08/29/2023
The Importance of Class Imbalance, Explainability and Ensemble MethodsWritten by Yamineesh Kanaparthy. Generated using Craiyon AI art generatorIntroductionCybersecurity is a constantly evolving field, with new threats emerging all the time. To stay ahead of the curve, security teams need to be...
What is a Hyperscaler and Are They Really Cost-Effective?
Blog Published: 08/31/2023
Originally published by Sangfor. Written by Nicholas Tay Chee Seng, CTO, Sangfor Cloud. “Do More with Less”“Do more with less” is an often-used phrase for IT teams globally. It encapsulates the challenging and growing expectations of IT. Today’s IT departments are charged with not only “keepin...
NIST's AI Risk Management Framework Explained
Blog Published: 08/30/2023
Originally published by Schellman. The National Institute of Standards and Technology (NIST) has made a significant move in introducing its groundbreaking AI Risk Management Framework (AI RMF). Designed to empower organizations and individuals with comprehensive risk management guidance, the A...
Is Your Data Insider-Proof? Five Steps To Keep Your Secrets Safe
Blog Published: 08/30/2023
Written by Yaki Faitelson, Co-Founder and CEO, Varonis. The recent Pentagon breach—in which 21-year-old guardsman Jack Teixeira allegedly leaked sensitive intelligence on social media sites to elevate his social standing—is reigniting conversations about protecting data from malicious in...
News of Note: Facing Days of Opportunity, Massive Change… and AI
Blog Published: 08/31/2023
Having just recorded a podcast with one of CSA’s Corporate Members, I find myself reflecting on how far the cybersecurity industry has come. Twenty-some years ago, cybersecurity, while getting some play with the executive suite in verticals like government and financial services, was all about...
How to Detect and Prevent Corporate Espionage
Blog Published: 09/05/2023
Originally published by Code42. Written by Aimee Simpson. Employees’ hard work, innovative ideas and collaborative efforts drive every organization’s success. In fact, many companies consider their employees their greatest asset. However, the trade secrets those employees create and use daily ...
Securing Healthcare Enterprises with Future-Ready IAM Solutions
Blog Published: 09/01/2023
Written by Sanjay Karandikar, Global Practice Head, IAM, Cybersecurity Services, HCLTech. The healthcare sector stands at a crucial crossroads. As it embraces cloud technologies to augment patient care and operational efficiency, the demand for robust, reliable cybersecurity solutions is at an...
Resolving the Data Protection Challenge Across Cloud and Remote Devices
Blog Published: 09/05/2023
Written by David Richardson, Vice President of Product, Lookout. As IT operations migrated to the cloud, it became easier to support remote and hybrid workers. The problem is that it has also complicated the infrastructure IT and security teams are tasked to protect.Organizations far and wide ...
What is SOC 2?
Blog Published: 09/12/2023
Originally published by CyberGuard Compliance. Written by Tim Roncevich. Protecting against data breaches and maintaining compliance require constant vigilance and consistent analysis.A SOC 2 report can help your organization protect and comply by confirming that you handle customer data prope...
5 Reasons Why Just-in-Time Cloud Access is Pioneering the Future of CIEM
Blog Published: 09/13/2023
Originally published by BritiveAs the digital landscape evolves, businesses face unprecedented challenges in securing sensitive data and critical resources stored within their cloud environments. The rise of cloud infrastructure and the proliferation of remote work has significantly expanded t...
2023 Global Cloud Threat Report: Cloud Attacks are Lightning Fast
Blog Published: 09/21/2023
Originally published by Sysdig. Written by Michael Clark. The second annual threat report from the Sysdig Threat Research Team (Sysdig TRT) is packed with their findings and analysis of some of the hottest and most important cybersecurity topics this year. Threat actors are really embracing th...
Discover How to Navigate Compliance Challenges at the Intersection of Data Governance and AI Integration
Blog Published: 09/06/2023
Written by Arun Dhanaraj, Vice President of Cloud Practices, Global Bank. Artificial intelligence (AI) is being used by businesses to innovate and go ahead in today's fast-paced market. However, with this adoption comes a multitude of data governance requirements and regulations that can be ov...
SCARLETEEL 2.0: Fargate, Kubernetes, and Crypto
Blog Published: 09/06/2023
Originally published by Sysdig. Written by Alessandro Brucato. SCARLETEEL, an operation reported on by the Sysdig Threat Research Team last February, continues to thrive, improve tactics, and steal proprietary data. Cloud environments are still their primary target, but the tools and technique...
How To Avoid a Security Potluck With Good Governance from Code to Cloud
Blog Published: 09/07/2023
Originally published by Tenable. Written by Upkar Lidder. Organizations are pushing their application development teams to integrate security into their daily operations and throughout the development process. However, without an overlying strategy or security governance, you can end u...
The Great Agent Debate: New Research Breaks Down the Love-Hate Relationship
Blog Published: 09/07/2023
Written by Andy Schneider, EMEA Field CISO, Lacework. While there are new cloud security debates every day, there's a common thread that security professionals can't seem to stop discussing: security agents. If your feelings toward agents go back and forth between appreciation and skepticism, ...
Security Challenges with SaaS Applications
Blog Published: 09/08/2023
Written by Eyal Estrin. SaaS (Software as a Service) is the most common cloud service model. According to the Shared Responsibility Model, "The consumer does not manage or control the underlying cloud infrastructure". As customers, this leaves us with very little control over services manage...