All Articles

All Articles
Do You Really Need Kubernetes?

Blog Published: 03/10/2021

This article was originally published on Intezer's blog. Kubernetes is one of the top open-source container orchestration projects, as it dramatically simplifies the creation and management of applications by providing built-in solutions to common problems. Although Kubernetes can be a solution f...

​The Age of Collaborative Security

Blog Published: 03/09/2021

Written by: Philippe Humeau, CEO, CrowdSecThe Cloud Security Alliance was born from a need, the need to collaborate, whether we are partners or competitors, for the greater good of our industry and its customers. That’s what alliances are made for, to become stronger together.Security wise, few a...

PCI Compliance Checklist: Ensure Compliance

Blog Published: 03/08/2021

Originally published on TokenEx's blog. You’ve heard about all of the breaches. You know no defense is impenetrable. And you’re likely aware of the risk that comes with storing payment card information.Still, you need to process cardholder data to run your business—that much is unavoidable. So, h...

Transforming Your IT Risk Management from Reactive to Proactive in 5 Steps

Blog Published: 03/04/2021

This blog was originally published on Hyperproof's blog.Written by Jingcong Zhao, Director of Content Strategy at HyperproofAs a seasoned IT risk management professional, you already know that staying on top of security is a constant battle. You probably also know that managing IT risks proactive...

CCAK Frequently Asked Questions

Blog Published: 03/02/2021

What is the Certificate of Cloud Auditing Knowledge? The Certificate of Cloud Auditing Knowledge (CCAK) is a credential that industry professionals can obtain to demonstrate their expertise in understanding the essential principles of auditing cloud computing systems. This credential leverages CS...

​A Powerful New Approach to Phishing – the Biggest Issue for Cybersecurity

Blog Published: 03/02/2021

Originally published on Ericom's blog.By Nigel Willis, Ericom Group CTO for EMEAPhishing attacks – which start with emails that appear to come from a legitimate company but are really devised by cybercriminals – are the top delivery mechanism for ransomware. Phishing takes full advantage of human...

​CSA STAR Attestation and STAR Certification Case Studies

Blog Published: 02/28/2021

As organizations look to cloud services to process more sensitive and critical data, security and risk management teams require tools to quickly assess and understand the types and rigor of security controls applied by cloud service providers. The CSA STAR Attestation and Certification are the fi...

​2020 Hindsight and 2021 Foresight: Lessons Learned in the Work From Home Era

Blog Published: 02/26/2021

By Lebin ChengOriginally posted by CloudVector It is hard to believe that it has already (or only?) been a year since a global pandemic forced organizations to adapt to the “new normal” of the work from home era. Given the 12-month milestone, now seems like the perfect time to stop and reflect on...

Building Confidence in Quantum-Resistant Algorithms: How much analysis is needed?

Blog Published: 02/25/2021

Written Roberta Faux, Lead Author and Quantum-safe Security Working Group MemberThe CSA Quantum-Safe Security Working Group has produced a new white paper, “Confidence in Post Quantum Algorithms.” This paper attempts to measure the published analysis of post-quantum or quantum-resistant cryptogra...

​Study Guide for the Certificate of Cloud Auditing Knowledge (CCAK) Now Available

Blog Published: 02/23/2021

The Certificate of Cloud Auditing Knowledge (CCAK) Study Guide is now available for purchase. The study guide is a valuable resource for IT, business professionals looking to qualify for the CCAK exam. It helps individuals acquire the necessary foundational knowledge of cloud governance, complian...

Remote working strategy: desktop virtualization or remote access?

Blog Published: 02/22/2021

This blog was originally published on Wandera.com.Written by Alex Wells from WanderaCreating a technology roadmap for your business can feel like an impossible task as there is always something new on the horizon that you need to account for. It doesn’t help that analysts are trying to predict th...

Cloud Security for SaaS Startups Part 1: Requirements for Early Stages of a Startup

Blog Published: 02/19/2021

Based on the Cloud Security for Startups guidelines written by the CSA Israel ChapterBackground Information security is a complicated subject even for mature enterprises, so it’s no wonder that startups find the area challenging. Planning, implementing and maintaining good-practice security are n...

How to Secure Your CDE and Achieve PCI DSS Compliance

Blog Published: 02/18/2021

Written by TokenExSuccessfully securing cardholder data should be top of mind as businesses try to keep up with the rise of data regulations and the resulting increased focus on consumer privacy. The process of securing a cardholder data environment (CDE) and ensuring it is compliant with the Pay...

How to choose a Zero Trust architecture: SDP or Reverse-Proxy?

Blog Published: 02/15/2021

This blog was originally published on Wandera.comWritten by Alex Wells at WanderaZero Trust Network Access (ZTNA) is the next generation access solution that is set to be a key part of IT administrators toolkits, displacing longstanding Virtual Private Networks (VPN). There are numerous factors a...

Abuse in the Cloud

Blog Published: 02/12/2021

Written By: Allan Stojanovic and Spencer Cureton from Salesforce, Inc.Join the new Cloud Abuse Circle Community, to participate in the discussion around this topic..When we talk about “abuse”, we use the term as shorthand for the much more encompassing “Abuse, Misuse, Malice and Crime” (with cred...

What is 3-D Secure Authentication, and Why Do I Need It?

Blog Published: 02/11/2021

Written by Dillon Phillips at TokenExThanks to the increasing popularity of ecommerce platforms, many card transactions that previously would have occurred in person can now be made online. The resulting rise in card-not-present (CNP) payments offers greater convenience for those initiating the t...

Can Blockchains Survive the Quantum Computer?

Blog Published: 02/09/2021

Suppose you were asked to rank the most significant innovations in IT over the last few years. What would come to your mind? It is very likely that both blockchain and quantum technologies would come close to the top of your list.Blockchains promise the secure exchange of digital assets (such as ...

Give us your feedback on potential CPE course topics

Blog Published: 02/08/2021

CSA is looking for input from the cybersecurity community on what topics you all would like to see in our new CPE course series. What subject areas would you be most interested in learning more about? Let us know by taking this 2 question survey here!Some potential course topics include: Cloud Ke...

How to avoid the biggest mistakes with your SaaS security

Blog Published: 02/08/2021

This blog was originally published on Wandera.comWritten by Alex Powell at WanderaThe biggest mistakes in SaaS securityThe popularity of SaaS applications for businesses continues to grow with 95% of businesses hosting sensitive information in the cloud. Traditional security models and boundary-f...

Benefits of the CCSK in Your Job Search

Blog Published: 02/07/2021

Considering whether or not to earn your Certificate of Cloud Security Knowledge (CCSK)? Obviously, we are biased, but Michael Benavidez, a Technical Writer at Securitas, was kind enough to share his experience earning the CCSK and how that impacted his job search.Michael Benavidez’s Experience Ea...

Looking for the CCM?

Start using the Cloud Controls Matrix to simplify compliance with multiple standards & regulations.