Cloud 101CircleEventsBlog
Master CSA’s Security, Trust, Assurance, and Risk program—download the STAR Prep Kit for essential tools to enhance your assurance!

All Articles

All Articles
Cloud Security Alliance Announces CSA Continuous, a 24-Hour, Rolling Global Virtual Event Featuring World-Class Speakers

Press Release Published: 09/14/2021

Attendees will learn from real-world cloud security implementation experiences and how to best leverage state-of-the-art cloud security architecturesSEATTLE – Sept. 14, 2021 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and ...

From CapEx to OpEx, and Greater Security

Blog Published: 09/13/2021

This blog was originally published by CyberCrypt here.In the cloud, cloud service providers (CSPs) manage the infrastructure they control—where organizational data and applications are stored—and perform the patching and updates so that the applications they use remain current.These advantages ar...

CCSK Success Stories: From a Cloud Technical Specialist

Blog Published: 09/13/2021

This is part of a blog series interviewing cybersecurity professionals who have earned their Certificate of Cloud Security Knowledge (CCSK). In these blogs we invite individuals to share some of the challenges they face in managing security for cloud computing and how they were able to leverage k...

Are You On a Security Service Edge (SSE) Journey?

Blog Published: 09/10/2021

This blog was originally published by Bitglass here.Written by Mike Schuricht, Bitglass.Last month, in the latest Gartner “Hype Cycle for Network Security, 2021” by Shilpi Handa and Pete Shoard, Security Service Edge (SSE) was introduced. This segment was not only “High” on the Benefit scale and ...

Detecting When Ransomware Moves Into Your Cloud

Blog Published: 09/09/2021

This blog was originally published on Vectra.ai With around 65,000 ransomware attacks expected this year in the US alone according to Yahoo! Finance, let’s just go out on limb here and say that folks are having a rough go at stopping these menacing occurrences. It doesn’t seem to matter which ...

Six Pillars of DevSecOps Series

Blog Published: 09/09/2021

Last updated: May 16, 2024While DevOps practices can help improve the management and operations of information security processes in an organization, the execution of these practices has to be secured. Security vulnerabilities can be inadvertently created due to lack of consideration of all aspec...

How Security Changes With Cloud Networking

Blog Published: 09/08/2021

Common on-premises network practices work differently for the cloud user and provider due to the lack of direct management of the underlying physical network. The most commonly used network security patterns rely on control of the physical communication paths and insertion of security appliances....

If a SYN Flood Attacks Your Network Tomorrow – Would Your Mitigation Be Able to Block It?

Blog Published: 09/08/2021

This blog was originally published by MazeBolt here.Written by Vova Kamenker, MazeBolt.There are various DDoS vectors that cause networks to crash, resulting in downtime for enterprises. One of these vectors, a common one, is the SYN flood. As DDoS attackers continue to change and vary their stra...

Kubernetes 1.22 – What’s new?

Blog Published: 09/06/2021

This blog was originally published by Sysdig here. Written by Víctor Jiménez Cerrada, Sysdig. Kubernetes 1.22 was released in early August, and it comes packed with novelties! Where do we begin? This release brings 56 enhancements, an increase from 50 in Kubernetes 1.21 and 43 in Kubernetes 1....

Here are Five Key Takeaways to Build a Best-in-Breed Security Architecture for Your Enterprise

Blog Published: 09/03/2021

Written by Fausto Lendeborg, CEO, Secberus.Secberus was invited to participate in Plug and Play’s (PnP) Partnerships Transforming Healthcare: Healthcare and the Cloud event. Our CEO, Fausto Lendeborg was accompanied by Edmond Mack, VP Security Architecture at GSK as well as Jennifer Thomas, Manag...

The Microservices Architecture Pattern: Expanding Security Assurance Ideas in Containers and Microservices

Blog Published: 09/02/2021

After 137 rolling discussions on Circle and growing a library of input material to 42 unique documents, 2 co-chairs and 343 Application Containers and Microservices (ACM) working group members spanning 5 continents created a third installment further expanding the ideas of CSA security assurance ...

What is CAIQ?

Blog Published: 09/01/2021

CCM, STAR, CCSK, CCAK – the Cloud Security Alliance is rolling in acronyms that you might not be familiar with yet. In this post, we’re going to get you up to speed on one of our most useful tools for cloud security transparency: CAIQ.A Questionnaire for Transparency and AssuranceCAIQ is an acron...

Cloud Security Alliance Federal Summit 2021 Live Event to Focus on Building Trust and Security in the New Normal

Press Release Published: 09/01/2021

New Executive Order on Improving the Nation’s Cybersecurity will be among key topics of discussionSEATTLE – Sept. 1, 2021 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computi...

The Future of DDoS Protection - Simulation Not Resilience!

Blog Published: 08/31/2021

This blog was originally published by MazeBolt here. Written by Yotam Alon, MazeBolt. Existing DDoS Protection Shortcomings As the word 'Resilient,' indicates, DDoS mitigation solutions do not prepare for attacks ahead of time, they adapt to and recover from DDoS attacks, after they have been ...

Cloud Security Alliance Releases Guidance on Microservices Architectural Pattern for a Repeatable Approach to Architecting, Deploying Secure Systems

Press Release Published: 08/31/2021

Document designed to help application developers, architects develop a vendor-neutral reference architecture foundationSEATTLE – Aug. 31, 2021 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secur...

MPA Best Practice Guidelines Name RBI as Implementation Guidance Infrastructure for Web Filtering and Usage Control

Blog Published: 08/27/2021

This blog was originally published by Ericom Software here.Written by Peter Fell, Group CTO, EME, Ericom Software. What Every TPN Vendor Should Know About Remote Browser Isolation In a recent important addition to the Motion Picture Association (MPA) Content Security Program, MPA Best Practic...

What is the MITRE ATT&CK Framework for Cloud? | 10 TTPs You Should Know Of

Blog Published: 08/26/2021

This blog was originally published by Sysdig here.Written by Stefano Chierici, Sysdig.MITRE ATT&CK framework for cloud will help you identify the possible threats related to a cloud environment and begin securing your cloud infrastructure.MITRE ATT&CK is a well-known comprehensive knowled...

CSA CxO Trust Initiative: Understanding the Priorities of the C-Suite

Blog Published: 08/25/2021

CSA’s CxO Trust Initiative is a broad-based, forward-looking initiative to elevate the knowledge of cloud computing and cybersecurity. Its core mission is to help Chief Information Security Officers (CISOs) better understand the priorities of their peers within the C-Suite and effectively communi...

The Future of Work is Hybrid – Is Your Security Ready?

Blog Published: 08/25/2021

This blog was originally published by Bitglass here.Written by Jonathan Andresen, Bitglass.It wasn’t that long ago that most of us used to work in an office. Fifteen months into the global COVID pandemic it’s now certain that the future will not be a full return to the office or a continuation of...

What are the Most Common Cloud Computing Service Delivery Models?

Blog Published: 08/24/2021

This blog was originally published by Alert Logic here.Written by Angelica Torres-Corral, Alert Logic.Cloud computing has transformed the way companies use technology, and your organization stands to gain a lot from migrating to a cloud solution. But which service delivery model is right for you?...

Looking for the CCM?

Start using the Cloud Controls Matrix to simplify compliance with multiple standards & regulations.