Cloud 101CircleEventsBlog

All Articles

All Articles
How To Fix Vulnerabilities Regularly And Block DDoS Attacks

Blog Published: 10/04/2021

This blog was originally published by MazeBolt here. In cybersecurity, a vulnerability is a weakness in a computer system or a network, making it susceptible to a cyberattack. Attackers exploit network vulnerabilities when they launch DDoS attacks that cause the target system or service to crash...

How Do You Secure Your Cloud Services?

Blog Published: 10/01/2021

This blog was originally published by Alert Logic here. In a previous post – What are the Most Common Cloud Computing Service Delivery Models? – we broke down the benefits of each: Software as a Service (SaaS)Infrastructure as a Service (IaaS)Platform as a Service (PaaS) Considering...

What The Goonies Teaches Us About Vendor Security

Blog Published: 09/30/2021

Written by Nick Sorensen, CEO of Whistic Why companies and their vendors should take a collaborative approach to cyber threats One of the biggest learnings I took from the recent SolarWinds and Microsoft Exchange hacks is breaches aren’t going away. They’re likely to get bigger as usage of appli...

7 Ways to Harden Your Environment Against Compromise

Blog Published: 09/29/2021

This blog was originally published by Microsoft here. Written by Alan Johnstone, CRSP Senior Consultant and Patrick Strijkers, CRSP Cyber Security Architect, Microsoft. Here at the global Microsoft Compromise Recovery Security Practice (CRSP), we work with customers who have experienced disrupt...

Cloud Security Alliance Announces Partnership with The Demo Forum

Press Release Published: 09/28/2021

SEATTLE – Sept. 28, 2021 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment, today announced a collaboration with The Demo Forum, an analyst-hosted, video int...

Building A SaaS Security Program: A Quick Start Guide

Blog Published: 09/28/2021

Written by Bryan Solari, AppOmni Every few years a new technology takes hold of businesses worldwide, expanding adoption at a speed that far outpaces our ability to secure it. Inevitably, the security shortfalls of this technology become known, and we build risk mitigation strategies that mel...

Latest Paper from Cloud Security Alliance Examines Top 10 Blockchain Attacks, Vulnerabilities, and Weaknesses

Press Release Published: 09/28/2021

In the last five years, 43 exchanges have been publicly hacked, and more than 49 Decentralized Finance protocols have been exploited, resulting in a loss of more than $2.8 billionSEATTLE – Sept. 28, 2021 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining s...

Understanding Compliance

Blog Published: 09/28/2021

This blog was originally published by CyberCrypt here.Tip: Don’t treat compliance merely as a checklist. Use the process as an audit of your security controls. Put security first: Build security around your threat model and then confirm that you are compliant.As regulators demand stricter securit...

5 Areas Exposing Your AWS Deployments to Security Threats

Blog Published: 09/27/2021

This blog was originally published on Vectra.ai Let’s be honest, the cloud has come at us fast this past year—especially if you’re a security practitioner. Like lining up to race Usain Bolt in the 100 meters kind of fast. Only he’s the cloud and you’re trying to keep up. As soon as you get se...

Cloud Security Alliance Announces Recipients of 2021 Ron Knode Service Awards

Press Release Published: 09/24/2021

Volunteers recognized for dedication, efforts to furthering cloud security best practicesSEATTLE – Sept. 24, 2021 –The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment,...

When Leadership Ignores DDoS Risk - 3 Tips for CISOs

Blog Published: 09/24/2021

This blog was originally published by MazeBolt here. Written by Yotam Alon, MazeBolt. A global telecom company suffered substantial damage from a DDoS attack, surprising its board and C-suite leaders, who had believed that they were well protected from DDoS attackers. The sudden attack brought...

Think Your Data is Secure? Three Questions You Need to Answer Right Now

Blog Published: 09/24/2021

Written by Yaki Faitelson, Co-Founder and CEO of Varonis. As organizations become more data driven, they store more data in more places and access it in more ways -- with phones, tablets and laptops. These ever-connected endpoints serve as gateways to large, centralized troves of sensitive infor...

Zero Trust Adoption Report: How Does Your Organization Compare?

Blog Published: 09/23/2021

This blog was originally published by Microsoft here.Written by Vasu Jakkal; Corporate Vice President, Security, Compliance and Identity; Microsoft.From the wide adoption of cloud-based services to the proliferation of mobile devices. From the emergence of advanced new cyberthreats to the recent ...

Why the World Needs Proactive Cybersecurity

Blog Published: 09/21/2021

This blog was originally published by Bitglass here.Written by Ben Rice, Bitglass.Computing is now in a ubiquitous state with users able to connect to a dizzying number of services and applications. Companies have networked together everything to reduce costs, increase automation, and achieve dig...

Survey Report: Cloud Security Posture Management and Misconfiguration Risks

Blog Published: 09/20/2021

Written by VMware.The worldwide public cloud services market grew 24.1% YoY in 2020.[1] With companies relying heavily on public clouds as the driver for digital transformation, the security of their cloud applications, data, and underlying infrastructure remains a top priority for Chief Informat...

How to Establish a Culture of Secure DevOps

Blog Published: 09/20/2021

This blog was originally published by Sysdig here.Written by Chris Kranz, Sysdig.We’re constantly told to “Shift Left” and that Secure DevOps is the only way to have confidence in your cloud native applications. But speaking to end-users and industry colleagues, it’s clear that there are some maj...

The Adoption of Multi-Cloud Drives the Need for Better Data Protection and Management of Encryption Keys and Policy Controls

Blog Published: 09/17/2021

This blog was originally published by Entrust here.Written by Jim DeLorenzo, Entrust.Enterprise adoption of multiple cloud platforms continues in earnest, whether it’s aimed at improving collaboration, reducing datacenter footprint, increasing customer response times or any number of other busine...

Cloud Security Alliance Releases New Guidance For Healthcare Delivery Organizations That Provides Measurable Approach to Detecting and Defending Against Ransomware Attacks

Press Release Published: 09/16/2021

With 560 ransomware attacks on healthcare providers in 2020, HDOs must architect their cloud for failure to better protect patient dataBELLEVUE, WA – SECtember – Sept. 16, 2021 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, a...

Reduce Your Risk: Supply Chain Attacks and the Rise of Ransomware

Blog Published: 09/16/2021

This blog was originally published by OneTrust here.Organizations are at risk of an attack on one of their vendors that may impact their day-to-day operations. Citing a recent major breach in the information technology industry as an example, it’s clear that by using ransomware hackers, malicious...

Sallie Mae CSO Jerry Archer Receives Cloud Security Alliance’s 2021 Philippe Courtot Leadership Award

Press Release Published: 09/16/2021

Archer honored for tireless commitment to innovation, peer collaboration, and leading-edge information technologyBELLEVUE, WA – SECtember – Sept. 16, 2021 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications and best practices to he...

Looking for the CCM?

Start using the Cloud Controls Matrix to simplify compliance with multiple standards & regulations.