Overview of the CxO Trust Initiative
Blog Published: 12/08/2021
Through the CxO Trust Initiative, CSA is looking to elevate the knowledge of cloud computing and cybersecurity best practices amongst executive teams by enabling Chief Information Security Officers (CISOs) with tools to communicate cloud computing, risk, governance, and compliance issues to their...
5 Elements of a Strong Cloud Security Strategy
Blog Published: 12/07/2021
This blog was originally published by Alert Logic here. Written by Antonio Sanchez, Alert Logic. Cloud security continues to be one of the top concerns for IT leaders. Over the last 18 months, cloud adoption has increased as organizations have aggressively pursued digital initiatives in respo...
Registration Opens for the Cloud Security Alliance Research Summit at RSA Conference 2022
Press Release Published: 12/07/2021
This year’s event will provide the latest updates in new and existing research projects, providing critical tools and guidance for the cloud-adopting communitySEATTLE – Dec. 7, 2021 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certificatio...
Does Your Supply Chain Have a Nasty Surprise for You?
Blog Published: 12/07/2021
This blog was originally published by Avanade here. Written by Rajiv Sagar, Avanade. Only 14% of Japanese business and IT executives know how well their partners and suppliers are enhancing their own cybersecurity—and that’s less than half the global average of 29%, according to research from Acc...
3 Steps for Continuous Improvement in Cloud Security
Blog Published: 12/06/2021
This blog was originally published by JupiterOne here. Written by Ashleigh Lee, JupiterOne. Relationships make life rich. Together, we can do so much more than a single person alone – inspire change on micro and macro levels, recover and restore hope from storms, practice empathy and compassion ...
Best Practices for Standardizing Identity Security at Scale
Blog Published: 12/06/2021
Written by Sam Flaster, CyberArk Dynamic identities. Dynamic environments. The sheer complexity of enterprise-scale cloud migrations can rapidly introduce new security challenges as organizations struggle to adapt their existing security programs to shifting IT paradigms. Unlocking the technol...
SECtember 2021 Recap: Keynotes by Industry Experts
Blog Published: 12/05/2021
Amidst the backdrop of the pandemic, cybersecurity professionals and teams are challenged to manage cloud computing risks at an unprecedented scale. In this moment, collaboration towards a cloud-centric view of cybersecurity is more important than ever. This past September, CSA hosted SECtember 2...
What’s Your Risk Appetite?
Blog Published: 12/04/2021
Let’s get some dinnerIn European history, the first restaurant was opened in Paris in 1765 with a single dish (sheep’s feet simmered in a white sauce). In eastern history, the first restaurants opened in around 1100 A.D. in China in a number of different cities. Either way, we can all agree that ...
Instant Messaging Could Take Down Your Network
Blog Published: 12/03/2021
This blog was originally published by Ericom here. By Mendy Newman, Ericom. Individuals who value both convenience and privacy – which means almost all users – depend on instant messaging (IM) apps to communicate across all aspects of their personal lives. Every time we open a new chat, Whats...
Cloud Security Alliance Issues Guidance to Help Organizations Optimize Business Outcomes When Using Cloud-native Key Management Services with External Key Origin
Press Release Published: 12/02/2021
Paper offers recommendations for choosing, planning, and deploying cloud-native key management systems when organizations want to or must import key materialSEATTLE – Dec. 2, 2021 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications...
How to Better Protect Cloud Workloads and Your Crown Jewels
Blog Published: 12/02/2021
This blog was originally published by Virsec here. Written by Matt Ambroziak, Virsec. Previously, I discussed how the attack surface is expanding in the cloud and the cloud-native security tools and best practices available to help mitigate risk. Now, let’s dig a little deeper into how attack...
The Complete Guide of Kubernetes Role-Based Access Control (RBAC)
Blog Published: 12/02/2021
This blog was originally published by ARMO here. Written by Amir Kaushansky, ARMO. What Is Kubernetes RBAC? First, let’s recap quickly what RBAC is in the context of a Kubernetes cluster. RBAC determines whether a certain entity (whether a user or a pod already running inside the cluster) is allo...
Vulnerability Trends for Q3
Blog Published: 12/01/2021
This blog was originally published by Vulcan Cyber here. Written by Orani Amroussi, Vulcan Cyber. Over the past few months, we’ve seen new vulnerability trends emerge, and with new and old vulnerabilities posing threats to the security of major organizations. Left unresolved, these can quickly re...
A North Star for the Industry: CSA Research Summit at RSA 2022
Blog Published: 12/01/2021
The RSA Conference will always have a special place in the history of the Cloud Security Alliance, as it does with many cybersecurity ventures. CSA was launched at the RSA Conference in 2009 with the first version of our best practices document. We followed that up with our first CSA Summit at RS...
New Guidance From Cloud Security Alliance Aims to Help Cloud Service Customers Better Evaluate Service Level Agreements
Press Release Published: 11/30/2021
Document defines the roles and responsibilities of well-recognized, currently available security services across eight categoriesSEATTLE – Nov. 30, 2021 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and best practices to hel...
The Right Way To Address Multicloud Cybersecurity
Blog Published: 11/30/2021
This blog was originally published by Booz Allen here. Written by Brad Beaulieu, Booz Allen. Tailoring security for multicloud’s unique challengesAs the industry’s cloud service vendors race to differentiate themselves with exclusive new features and innovations, federal agencies are riding the i...
Why Now is the Time for Chaos (Engineering)
Blog Published: 11/30/2021
Written by Morey J. Haber, BeyondTrust. If you are old enough to remember the television show Get Smart, you may be familiar with the concept of applying chaos to provide order. While this spy show spoof mocked political stereotypes of the time for control versus chaos, the slapstick humor was de...
How Cloud Vendors Confront Cloud Migration Challenges
Blog Published: 11/29/2021
This blog was originally published by Vulcan Cyber here. Written by Yaniv Bar-Dayan, Vulcan Cyber co-founder and CEO. The major cloud service providers (CSPs) and other tech giants are stepping up their security game – introducing native offerings to aid their customers in the face of cloud migra...
CISOs Need a Break. Your Security Tech Stack Should Provide It.
Blog Published: 11/29/2021
By Fausto Lendeborg, Secberus. Chief information security officers of enterprise organizations face increasingly complex environments. Whether it’s: The constant presence of change, ITPro. says, “Security is one of the most complex parts of any organisation, and its parameters can chang...
What is Ransomware?
Blog Published: 11/28/2021
Contributions by Michael Roza and Vince Campitelli Ransomware is a rapidly growing problem that has increased 715% year-over-year, according to the latest Threat Landscape Report 2020 by Bitdefender (Bitfinder, 2020). Ransomware is highly profitable, which has made it the fastest growing malware ...