Cloud 101CircleEventsBlog

All Articles

All Articles
Cloud Security for SaaS Startups Part 2: Application & Platform Security

Blog Published: 05/03/2021

Based on the Cloud Security for Startups guidelines written by the CSA Israel ChapterAs a SaaS startup, how can your organization ensure you implement proper security for your applications and platforms? In this blog we provide a preview of the information and guidelines available in the Cloud Se...

A New Resource for API Security Best Practices

Blog Published: 04/30/2021

The applicative infrastructure is becoming more and more complex due to different requirements, design patterns, and technologies. In many of these cases, one of those requirements is to connect other parties to systems, and in other cases, to connect systems to other parties. Nowadays, the most ...

Six Key Characteristics of a Modern Secure Web Gateway

Blog Published: 04/29/2021

This blog was originally published by Bitglass here.As we head into the second quarter of 2021 and mark a full year of remote work for many organizations, it is clear that the COVID-19 pandemic has accelerated digital transformation globally and changed the future of work — likely permanently. A ...

What an Auditor Should Know about Cloud Computing Part 3

Blog Published: 04/27/2021

With the launch of the Certificate of Cloud Auditing Knowledge (CCAK) credential by ISACA and CSA, Moshe Ferber has put together some of the insights gained during the creation of the CCAK. This is the third in a series of three blogs dealing with the essentials an auditor needs to know about clo...

How to Secure Cloud Non-Native Workloads

Blog Published: 04/26/2021

This blog was originally published by Intezer here.Not All Applications are Cloud-NativeCompanies are adopting cloud at a faster pace but not all applications are born cloud-native. Many traditional applications are simply “lifted and shifted” to the cloud as a first step in the cloud transformat...

CCAK Testimonials: From a Cybersecurity Architect

Blog Published: 04/22/2021

The Certificate of Cloud Auditing Knowledge (CCAK) is the first credential available for industry professionals to demonstrate their expertise in the essential principles of auditing cloud computing systems. The CCAK credential and training program fills the gap in the market for technical educat...

Cloud Security Alliance Shines Light on Excellence in Cloud Provider Security

Press Release Published: 04/22/2021

Trusted Cloud Provider program allows organizations to demonstrate commitment to holistic securitySEATTLE – April 22, 2021 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing en...

Introduction to the NIST Cybersecurity Framework

Blog Published: 04/21/2021

This blog was originally published by OpsCompass hereWritten by Kevin Hakanson, OpsCompassSecurity Framework Based on Standards, Guidelines, and PracticesThe NIST Cybersecurity Framework (NIST CSF) was created via a collaboration between the United States government and industry as a voluntary fr...

General James Mattis to Headline Cloud Security Alliance CISO Summit at RSA Conference 2021

Press Release Published: 04/21/2021

Virtual summit to explore critical strategies enterprises must have in place to succeedSEATTLE – April 21, 2021 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment, ...

What an Auditor Should Know about Cloud Computing Part 2

Blog Published: 04/20/2021

Deep Dive into Cloud GovernanceWith the launch of the Certificate of Cloud Auditing Knowledge (CCAK) credential by ISACA and CSA, Moshe Ferber has put together some of the insights gained during the creation of the CCAK. This is the second in a series of three blogs dealing with the essentials an...

Cloud-Native Security 101

Blog Published: 04/19/2021

This blog was originally published by Intezer.The arrival of the cloud has changed the application development process. Agile cloud-native applications have replaced traditional monolithic application architectures, and components are no longer bundled into a single server. This transformation ha...

Why Remote Browser Isolation (RBI), Why Now?

Blog Published: 04/14/2021

This post was originally published on Ericom's blog here.Written by Dr. Chase Cunningham, EricomRemote Browser Isolation, aka RBI, was more of a “fringe” technology when it first came on the scene. I wrote about RBI a few years ago while working as an analyst. At that time, it was noted as someth...

Cloud Security Alliance Releases Guidance for Crypto-Asset Exchange Security

Press Release Published: 04/13/2021

Document outlines effective exchange security to help educate users, policymakers, cybersecurity professionals on secure crypto-exchangesSEATTLE – April 13, 2021 – The Cloud Security Alliance® (CSA), the world’s leading organization dedicated to defining and raising awareness of best practices to...

​Developing Key Management Systems

Blog Published: 04/09/2021

Based on a publication written by the Cloud Key Management Working GroupKey management is the management of cryptographic keys in a cryptosystem. A reliable key management system (KMS) helps a business meet compliance and data control requirements, and also benefits the overall security of the or...

​How CCAK Elevates and Impacts Other Credentials

Blog Published: 04/07/2021

Written by Daniele Catteddu, Chief Technology Officer, CSAThe skills gap is not a new topic when it comes to cloud or cybersecurity. Per Flexera's 2020 State of the Cloud report, 59% of enterprises expect cloud usage to exceed prior planned usage due to COVID-19 – which creates a high demand for ...

​Cloud-Native Security Starts with the Cloud

Blog Published: 04/07/2021

Oracle author: Maywun Wong, Director, Product MarketingContributed by: Frank Dickson, IDC, Program Vice President, Security & Trust“Cloud-native security!” is the battle cry of the day. We all want it. But what is it? Everyone seems to define it differently. My suggestion is that any discussi...

What an Auditor Should Know about Cloud Computing Part 1

Blog Published: 04/06/2021

An Introduction to Cloud Terminology and General GovernanceWritten by Moshe Ferber, CCSK and CCAK InstructorThis is the first in a series of three blogs dealing with the essentials an auditor needs to know about cloud computing. In recent years, there has been a strong focus on building cloud pla...

Cloud Security Alliance Announces Rolling Call for Participation, Content for Virtual and In-person Global Events

Press Release Published: 04/01/2021

Subject matter experts invited to share expertise with cyber, cloud communitiesSEATTLE – April 1, 2021 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment, today ann...

CCSK Success Stories: From a Senior Executive

Blog Published: 04/01/2021

This is part of a blog series interviewing cybersecurity professionals who have earned their Certificate of Cloud Security Knowledge (CCSK). In these blogs we invite individuals to share some of the challenges they face in managing security for cloud computing and how they were able to leverage k...

Cloud Security Alliance Releases Latest Survey Report on State of Cloud Security Concerns, Challenges, and Incidents

Press Release Published: 03/30/2021

Survey finds that 58% of respondents are concerned about security in the cloud, while misconfigurations are one of the leading causes of breaches and outages, as public cloud adoption doubles over past two yearsSEATTLE – March 30, 2021 – The Cloud Security Alliance (CSA), the world’s leading orga...

Looking for the CCM?

Start using the Cloud Controls Matrix to simplify compliance with multiple standards & regulations.