Cloud 101CircleEventsBlog

All Articles

All Articles
Cloud Security Alliance Releases New Guidelines Providing Insight Into Effectively Using Its Industry-Leading Security Assessment, Assurance Tools

Press Release Published: 09/15/2021

Documents provide best practices in using and implementing the Cloud Controls Matrix and Security, Trust, Assurance and Risk (STAR) programBELLEVUE, WA – SECtember – Sept. 15, 2021 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awareness of...

Cybersecurity’s Next Fight: How to Protect Employees From Online Harassment

Blog Published: 09/15/2021

This blog was originally published by Microsoft here.The security community is continuously changing, growing, and learning from each other to better position the world against cyber threats. In this blog post, Microsoft Product Marketing Manager Natalia Godyla talks with Leigh Honeywell, CEO and...

The Evolution of Private Cloud Computing and Shared Responsibility

Blog Published: 09/15/2021

Summary: Cloud computing has changed over the last 10 years – the Private Cloud has undergone a big change too. This blog captures the evolution of the Private Cloud with a focus on the shared responsibility model. A previous blog talks about the different service models as they have evolved...

Latest Research from Cloud Security Alliance Offers Guidance on Designing Serverless Architecture, Adopting Cloud-Native Key Management Systems

Press Release Published: 09/14/2021

Documents offer road maps to those looking to implement new systems within their organizationsBELLEVUE, WA – SECtember – Sept. 14, 2021 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure...

Coping With the Ransomware Threat

Blog Published: 09/14/2021

This blog was originally published by Oracle here.Written by Eric Maurice, Oracle.News of successful large-scale ransomware attacks are becoming more frequent. In some instances, companies considered part of the U.S. Critical Infrastructure have been compromised and their normal operations have ...

Cloud Security Alliance Announces CSA Continuous, a 24-Hour, Rolling Global Virtual Event Featuring World-Class Speakers

Press Release Published: 09/14/2021

Attendees will learn from real-world cloud security implementation experiences and how to best leverage state-of-the-art cloud security architecturesSEATTLE – Sept. 14, 2021 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and ...

From CapEx to OpEx, and Greater Security

Blog Published: 09/13/2021

This blog was originally published by CyberCrypt here.In the cloud, cloud service providers (CSPs) manage the infrastructure they control—where organizational data and applications are stored—and perform the patching and updates so that the applications they use remain current.These advantages ar...

CCSK Success Stories: From a Cloud Technical Specialist

Blog Published: 09/13/2021

This is part of a blog series interviewing cybersecurity professionals who have earned their Certificate of Cloud Security Knowledge (CCSK). In these blogs we invite individuals to share some of the challenges they face in managing security for cloud computing and how they were able to leverage k...

Are You On a Security Service Edge (SSE) Journey?

Blog Published: 09/10/2021

This blog was originally published by Bitglass here.Written by Mike Schuricht, Bitglass.Last month, in the latest Gartner “Hype Cycle for Network Security, 2021” by Shilpi Handa and Pete Shoard, Security Service Edge (SSE) was introduced. This segment was not only “High” on the Benefit scale and ...

Detecting When Ransomware Moves Into Your Cloud

Blog Published: 09/09/2021

This blog was originally published on Vectra.ai With around 65,000 ransomware attacks expected this year in the US alone according to Yahoo! Finance, let’s just go out on limb here and say that folks are having a rough go at stopping these menacing occurrences. It doesn’t seem to matter which ...

Six Pillars of DevSecOps Series

Blog Published: 09/09/2021

Last updated: May 16, 2024While DevOps practices can help improve the management and operations of information security processes in an organization, the execution of these practices has to be secured. Security vulnerabilities can be inadvertently created due to lack of consideration of all aspec...

How Security Changes With Cloud Networking

Blog Published: 09/08/2021

Common on-premises network practices work differently for the cloud user and provider due to the lack of direct management of the underlying physical network. The most commonly used network security patterns rely on control of the physical communication paths and insertion of security appliances....

If a SYN Flood Attacks Your Network Tomorrow – Would Your Mitigation Be Able to Block It?

Blog Published: 09/08/2021

This blog was originally published by MazeBolt here.Written by Vova Kamenker, MazeBolt.There are various DDoS vectors that cause networks to crash, resulting in downtime for enterprises. One of these vectors, a common one, is the SYN flood. As DDoS attackers continue to change and vary their stra...

Kubernetes 1.22 – What’s new?

Blog Published: 09/06/2021

This blog was originally published by Sysdig here. Written by Víctor Jiménez Cerrada, Sysdig. Kubernetes 1.22 was released in early August, and it comes packed with novelties! Where do we begin? This release brings 56 enhancements, an increase from 50 in Kubernetes 1.21 and 43 in Kubernetes 1....

Here are Five Key Takeaways to Build a Best-in-Breed Security Architecture for Your Enterprise

Blog Published: 09/03/2021

Written by Fausto Lendeborg, CEO, Secberus.Secberus was invited to participate in Plug and Play’s (PnP) Partnerships Transforming Healthcare: Healthcare and the Cloud event. Our CEO, Fausto Lendeborg was accompanied by Edmond Mack, VP Security Architecture at GSK as well as Jennifer Thomas, Manag...

The Microservices Architecture Pattern: Expanding Security Assurance Ideas in Containers and Microservices

Blog Published: 09/02/2021

After 137 rolling discussions on Circle and growing a library of input material to 42 unique documents, 2 co-chairs and 343 Application Containers and Microservices (ACM) working group members spanning 5 continents created a third installment further expanding the ideas of CSA security assurance ...

What is CAIQ?

Blog Published: 09/01/2021

CCM, STAR, CCSK, CCAK – the Cloud Security Alliance is rolling in acronyms that you might not be familiar with yet. In this post, we’re going to get you up to speed on one of our most useful tools for cloud security transparency: CAIQ.A Questionnaire for Transparency and AssuranceCAIQ is an acron...

Cloud Security Alliance Federal Summit 2021 Live Event to Focus on Building Trust and Security in the New Normal

Press Release Published: 09/01/2021

New Executive Order on Improving the Nation’s Cybersecurity will be among key topics of discussionSEATTLE – Sept. 1, 2021 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computi...

The Future of DDoS Protection - Simulation Not Resilience!

Blog Published: 08/31/2021

This blog was originally published by MazeBolt here. Written by Yotam Alon, MazeBolt. Existing DDoS Protection Shortcomings As the word 'Resilient,' indicates, DDoS mitigation solutions do not prepare for attacks ahead of time, they adapt to and recover from DDoS attacks, after they have been ...

Cloud Security Alliance Releases Guidance on Microservices Architectural Pattern for a Repeatable Approach to Architecting, Deploying Secure Systems

Press Release Published: 08/31/2021

Document designed to help application developers, architects develop a vendor-neutral reference architecture foundationSEATTLE – Aug. 31, 2021 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secur...

Looking for the CCM?

Start using the Cloud Controls Matrix to simplify compliance with multiple standards & regulations.