All Articles

All Articles
​3 Data Strategies that will be Critical for Surviving 2021

Blog Published: 02/05/2021

By: Jim McGann, Vice President Marketing and Business Development, Index EnginesUsers create content on a daily basis. Much of this content has no long-term value and is not business critical, however, a small percentage is key to running operations. Some of it contains sensitive client informa...

CCM v4 FAQ - Transition Timeline

Blog Published: 02/04/2021

On January 21st CSA released version 4 of the Cloud Controls Matrix (CCM). The new version ensures coverage of requirements deriving from new cloud technologies, new controls and enhanced interoperability and compatibility with other standards.In this blog we will discuss the transition timeline...

Cloud Security Alliance Announces 2021 CSA Research Fellows

Press Release Published: 02/04/2021

Award honors volunteers for significant accomplishments, contributions to CSA researchSEATTLE – Feb. 4, 2021 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications and best practices to help ensure a secure cloud computing environmen...

The Evolution of Cloud Computing and the Updated Shared Responsibility

Blog Published: 02/04/2021

Written by Vishwas Manral, Founder and CEO at NanoSec, CSA Silicon Valley Chapter.Cloud computing has changed over the last 10 years. This blog captures the reason why the original service models are no longer sufficient as a result of the changes in the cloud landscape with the growth of Contain...

Transitioning Traditional Apps into the Cloud

Blog Published: 02/03/2021

Contributed by IntezerFor organizations, cloud adoption is the primary driver of digital transformation and modernizing traditional applications to cloud constructs is a major milestone. Cloud opens up a world of opportunities, with a choice of IaaS, PaaS, and SaaS as deployment models.Organizati...

2020 Hindsight and 2021 Foresight – Lessons Learned and Predictions for the Velocity of Business

Blog Published: 02/01/2021

By Ravi Balupari, Founder & CTO, CloudVector This blog originally was published by CloudVectorThey say that hindsight is 2020, which has certainly been the case this year. For most organizations, 2020 orchestrated a fundamental shift to the way we work. The paradigm shift to work from home ha...

CCSK Success Stories: from a Cybersecurity Engineer

Blog Published: 01/31/2021

In this blog series we invite individuals to share some of the challenges they face in managing security for cloud computing and how they were able to leverage knowledge from the Certificate of Cloud Security Knowledge (CCSK) in their current roles. In this blog we'll be interviewing Lucas, a Cyb...

Resources to Help Address Cybersecurity Challenges in Healthcare

Blog Published: 01/29/2021

By Vince Campitelli, Co-Chair for the CSA Health Information Management Working Group (HIM)According to a 2019 Thales Report (3) 70% of healthcare organizations surveyed reported a data breach, with a third reporting a breach within the last year. All organizations surveyed reported collecting, ...

Cloud Workload Security: Part 4 - Explaining the Security Features of GCP

Blog Published: 01/28/2021

Written by IntezerWhen it comes to securing your workloads in the cloud, having a well-defined security strategy with the right controls means that the battle is only half won. This series explains the important security controls and categories that can help you build a strong cloud security stra...

Cloud Security Alliance’s New Internet of Things (IoT) Security Controls Framework Allows for Easier Evaluation, Implementation of Security Controls within IoT Architectures

Press Release Published: 01/28/2021

Updated Framework simplifies categorization of controls into new set of domains, minimizes control allocation to components within an IoT architectureSEATTLE – Jan. 28, 2021 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications and b...

​Earning Trust in the 21st Century - Creating Trust Frameworks in a Zero Trust World

Blog Published: 01/26/2021

By: Anil Karmel, President, Cloud Security Alliance Washington DC Metro Area Chapter (CSA-DC)Our world is more connected and reliant on technology than ever before, yet we are more disconnected and trust each other less now than ever before. New attacks such as the SolarWinds hack have immense re...

Google Report Highlights Malware Targeting Browser Vulnerabilities

Blog Published: 01/25/2021

By Nick Kael, CTO at EricomThe browser is the targetLast week, Google’s Project Zero exploit research team published reports detailing a sophisticated cyber operation that targeted vulnerabilities in Chrome and Windows, installing malware to exploit weaknesses in the browser and operating system...

Help CSA Develop a New SDP Training - Join the SDP Expert Group

Blog Published: 01/24/2021

Join the Software Defined Perimeter Expert GroupCSA is looking for volunteers to join the CSA Software Defined Perimeter (SDP) Expert Group to help review and advise on the scope, curriculum, objectives, structure, go-to-market strategy and value proposition for an 8 hour CSA SDP Training.This gr...

Cloud Security Alliance’s New Cloud Controls Matrix v4 Adds New Log and Monitoring Domain and More Than 60 New Cloud Security Controls

Press Release Published: 01/21/2021

Represents significant increase in requirements resulting from new cloud technologiesSEATTLE – Jan. 21, 2021 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications and best practices to help ensure a secure cloud computing environmen...

The CSA Cloud Controls Matrix (CCM) V4: Raising the cloud security bar to the next level

Blog Published: 01/21/2021

Written by: Daniele Catteddu, Chief Technology Officer, Cloud Security Alliance and Lefteris Skoutaris, CCM Program Manager, Cloud Security AllianceOver the course of the last decade since its first appearance in 2010, the Cloud Controls Matrix (CCM) has become a reference for any organization se...

NACHA Updates | Supplementing Data Security Requirements

Blog Published: 01/19/2021

Written by TokenExIn late 2019, NACHA supplemented its existing Security Framework for the ACH Network with a new rule applying to all merchants, billers, businesses, governments, and third parties that send 2 million or more ACH payments per year. The rule was expected to roll out in two phases,...

CCSK Success Stories: CSA Japan Chapter Executive Director

Blog Published: 01/13/2021

This is part of a blog series interviewing cybersecurity professionals who have earned their Certificate of Cloud Security Knowledge (CCSK). In these blogs we invite individuals to share some of the challenges they face in managing security for cloud computing and how they were able to leverage k...

SolarWinds, GitHub Leaks and Securing the Software Supply Chain

Blog Published: 01/11/2021

Written by BluBracketThe massive cybersecurity breach from SolarWinds by now has reached everyone in our industry’s attention. It’s a truly wide-spread and dangerous breach that, at least from what we know now, is an example of two trends in cybersecurity that frankly need more attention by any c...

Lessons Learned from GoDaddy’s Email Phishing Simulation Debacle

Blog Published: 01/08/2021

Written By: Omer Taran, Co-founder & CTO, CybeReadyCISOs and security teams know that running phishing simulations is a tricky business. As security professionals who deal with employee training, one thing we can do to avoid taking the wrong turn is learn from each other’s mistakes. Above any...

Cloud Workload Security: Part 3 - Explaining Azure’s Security Features

Blog Published: 01/07/2021

Written by IntezerCloud security management will always remain an ongoing journey, as threats keep evolving and organizations need to keep updating their cloud security strategy. A well-defined set of security controls and categories helps you set a strong baseline in this journey, irrespective o...

Looking for the CCM?

Start using the Cloud Controls Matrix to simplify compliance with multiple standards & regulations.