Cloud 101CircleEventsBlog
Master CSA’s Security, Trust, Assurance, and Risk program—download the STAR Prep Kit for essential tools to enhance your assurance!

All Articles

All Articles
CCSK Success Stories: From a Manager of Cloud Infrastructure

Blog Published: 11/14/2021

This is part of a blog series interviewing cybersecurity professionals who have earned their Certificate of Cloud Security Knowledge (CCSK). In these blogs we invite individuals to share some of the challenges they face in managing security for cloud computing and how they were able to leverage k...

What is the Difference Between Software Defined Perimeter and Zero Trust?

Blog Published: 11/13/2021

Written by the CSA SDP and Zero Trust Working Group Summary: After reading this blog you’ll understand what Zero Trust is, the problems it helps solve, and the basics around what implementing Zero Trust looks like using SDP. What is Zero Trust? “Zero Trust” changes how network access works; as th...

How the Incident Response Lifecycle Changes for Cloud

Blog Published: 11/13/2021

Incident Response (IR) is a critical facet of any information security system. Most organizations have some sort of IR plan to govern how they will investigate an attack, but as the cloud presents distinct differences in both access to forensic data and governance, organizations must consider how...

Einstein’s Wormhole: Capturing Outlook & Google Calendars via Salesforce Guest User Bug

Blog Published: 11/12/2021

This blog was originally published by Varonis here. Written by Nitay Bachrach, Varonis. If your organization uses Salesforce Communities and Einstein Activity Capture, you might have unknowingly exposed your administrator’s Outlook or Google calendar events to the internet due to a bug called Ein...

Why Should Enterprises Move to a Zero-Trust Model?

Blog Published: 11/12/2021

This blog was originally published by Unbound Security here. Written by Lior Levy, Unbound Security. Refer to Unbound Security's webinar on November 18, 2021 for more information about the security of cryptographic keys, which is discussed later in this blog. The introduction of new norms such as...

5 Best Practices to Reduce the Attack Surface in the Cloud

Blog Published: 11/10/2021

This blog was originally published by Virsec here. Written by Matt Ambroziak, Virsec. Over the last 18 months the cloud has gone mainstream. In case you need proof, Gartner forecasts end-user spending on public cloud services to grow 23.1% in 2021 to total $332.3 billion, up from $270 billion...

Making the Security Conversation More “Feature-Driven”

Blog Published: 11/10/2021

This blog was originally published by Adobe here. Written by Sandhya Narayan, Principal Program Manager, Adobe. A constantly changing security landscape driven by increasingly persistent threats, growing attack sophistication, and tighter compliance requirements keeps both security and product...

New Cloud Security Alliance Guidance Provides Framework for Protecting Critical Healthcare Systems While Taking Risk to Patient Safety Into Account

Press Release Published: 11/09/2021

Paper from IoT Working Group highlights the importance of not treating medical device incident response as a one-size-fits-allSEATTLE – Nov. 9, 2021 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and best practices to help en...

What is Gartner’s SASE Model, and How Will it Affect Your Cloud Security Stack?

Blog Published: 11/09/2021

By Chloe Whitaker Originally Published by Cisco on August 31, 2021 The way we think about networking and cybersecurity has changed dramatically in recent years. The rise of remote workers, coupled with the growing push of company data and infrastructure into the cloud, prompted Gartner to outli...

Security Spotlight: Critical Vulnerability Exploits and Patches, Plus Novel Attack Tactics

Blog Published: 11/09/2021

This blog was originally published by Bitglass here. Written by Jeff Birnbaum, Bitglass. Here are the top security stories from September 2021: Cisco Patches Three Critical Vulnerabilities Impacting Wireless Controllers and SD-WAN.Critical VMware vCenter Vulnerability Exploited in the WildNew APT...

What Are the Security Challenges with BYOK for Hybrid Cloud Users?

Blog Published: 11/08/2021

This blog was originally published by Unbound Security here. Written by Lior Levy, Unbound Security. Refer to Unbound Security's webinar on November 18, 2021 for more information about key management and cryptography.Moving to the cloud usually brings several advantages, such as flexibility, scal...

From the Trenches: 4 Cloud Security Lessons from Aon’s Chief Security Officer Anthony Belfiore

Blog Published: 11/08/2021

This blog was originally published by Wiz here. Written by Josh Dreyfuss, Wiz. Cloud has driven innovation and agility for organizations, but for security teams it has also brought new levels of complexity around people, processes, and technology. Today’s elastic cloud environments have intr...

5 Tips on How To Build a Great Cloud Migration Roadmap

Blog Published: 11/08/2021

Written by Susan Craig Just like any other complex project, cloud migration implies much more than just moving workloads. Its successful application allows companies to enhance the workflow, increase agility and boost the process's efficiency. Furthermore, that’s a great solution for setting up a...

More on Targeted Attacks and How to Protect Against Them

Blog Published: 11/05/2021

Written by Alex Vakulov. Small and big organizations often face targeted attacks. APT (Advanced Persistent Threat) groups improve the quality of their operations, causing more serious damage. Timely detection and response, training of personnel, and advanced training of information security depa...

Why Your Organization Needs Cyber Insurance

Blog Published: 11/05/2021

This blog was originally published by SafeBase here. Written by Kevin Qiu, Director of Information Security at SafeBase. Security Incidents Are Becoming Increasingly Expensive Cyber security products and defensive techniques have come a long way over the past few years as cloud computing has t...

Why Choose an MSSP

Blog Published: 11/04/2021

This blog was originally published by Cloudtango here. Written by Cloudtango. Since the pandemic, working from home has become widely adopted across all type of businesses around the globe. As the memory of the pandemic starts to progressively fade, many predict remote working will remain in one ...

Modern Cybersecurity: Book Preface

Blog Published: 11/04/2021

On October 19, 2021, JupiterOne published a book, "Modern Cybersecurity: Tales from the Near-Distant Future". This is an excerpt from the Preface. PrefaceCybersecurity is transforming. The last decade of cyberattacks, threat actors, and an endless stream of breached data was just a catnap compare...

How Can You Protect Yourself from Data Leaks?

Blog Published: 11/03/2021

Written by Romain Coussement, Cloud security expert at Fortica Leaks of sensitive data were prominent in the news in the summer of 2019 and the months that followed. One after the other, large companies saw their customers’ sensitive data exposed on the Internet. How can you mitigate the threat...

Why the Facebook Outage and Twitch Breach Matter to Business Leaders

Blog Published: 11/02/2021

By Josh Stella, Fugue Co-Founder and CEO Originally Published at Fugue on October 14, 2021 This month, Facebook and Twitch both suffered serious damage at their own hands, and every executive needs to understand what happened and how these types of incidents are preventable. At Fac...

4 Misconceptions About DDoS Mitigation

Blog Published: 11/02/2021

This blog was originally published by MazeBolt here. Written by Yotam Alon, MazeBolt. After several years in cybersecurity and specifically in the DDoS mitigation space, I often come across certain common and widespread misconceptions. Here are my top four: Misconception #1: "DDoS attacks are ...

Looking for the CCM?

Start using the Cloud Controls Matrix to simplify compliance with multiple standards & regulations.