CCAK Testimonials: From a Cybersecurity Architect
Blog Published: 04/22/2021
The Certificate of Cloud Auditing Knowledge (CCAK) is the first credential available for industry professionals to demonstrate their expertise in the essential principles of auditing cloud computing systems. The CCAK credential and training program fills the gap in the market for technical educat...
Cloud Security Alliance Shines Light on Excellence in Cloud Provider Security
Press Release Published: 04/22/2021
Trusted Cloud Provider program allows organizations to demonstrate commitment to holistic securitySEATTLE – April 22, 2021 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing en...
Introduction to the NIST Cybersecurity Framework
Blog Published: 04/21/2021
This blog was originally published by OpsCompass hereWritten by Kevin Hakanson, OpsCompassSecurity Framework Based on Standards, Guidelines, and PracticesThe NIST Cybersecurity Framework (NIST CSF) was created via a collaboration between the United States government and industry as a voluntary fr...
General James Mattis to Headline Cloud Security Alliance CISO Summit at RSA Conference 2021
Press Release Published: 04/21/2021
Virtual summit to explore critical strategies enterprises must have in place to succeedSEATTLE – April 21, 2021 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment, ...
What an Auditor Should Know about Cloud Computing Part 2
Blog Published: 04/20/2021
Deep Dive into Cloud GovernanceWith the launch of the Certificate of Cloud Auditing Knowledge (CCAK) credential by ISACA and CSA, Moshe Ferber has put together some of the insights gained during the creation of the CCAK. This is the second in a series of three blogs dealing with the essentials an...
Cloud-Native Security 101
Blog Published: 04/19/2021
This blog was originally published by Intezer.The arrival of the cloud has changed the application development process. Agile cloud-native applications have replaced traditional monolithic application architectures, and components are no longer bundled into a single server. This transformation ha...
Why Remote Browser Isolation (RBI), Why Now?
Blog Published: 04/14/2021
This post was originally published on Ericom's blog here.Written by Dr. Chase Cunningham, EricomRemote Browser Isolation, aka RBI, was more of a “fringe” technology when it first came on the scene. I wrote about RBI a few years ago while working as an analyst. At that time, it was noted as someth...
Cloud Security Alliance Releases Guidance for Crypto-Asset Exchange Security
Press Release Published: 04/13/2021
Document outlines effective exchange security to help educate users, policymakers, cybersecurity professionals on secure crypto-exchangesSEATTLE – April 13, 2021 – The Cloud Security Alliance® (CSA), the world’s leading organization dedicated to defining and raising awareness of best practices to...
Developing Key Management Systems
Blog Published: 04/09/2021
Based on a publication written by the Cloud Key Management Working GroupKey management is the management of cryptographic keys in a cryptosystem. A reliable key management system (KMS) helps a business meet compliance and data control requirements, and also benefits the overall security of the or...
How CCAK Elevates and Impacts Other Credentials
Blog Published: 04/07/2021
Written by Daniele Catteddu, Chief Technology Officer, CSAThe skills gap is not a new topic when it comes to cloud or cybersecurity. Per Flexera's 2020 State of the Cloud report, 59% of enterprises expect cloud usage to exceed prior planned usage due to COVID-19 – which creates a high demand for ...
Cloud-Native Security Starts with the Cloud
Blog Published: 04/07/2021
Oracle author: Maywun Wong, Director, Product MarketingContributed by: Frank Dickson, IDC, Program Vice President, Security & Trust“Cloud-native security!” is the battle cry of the day. We all want it. But what is it? Everyone seems to define it differently. My suggestion is that any discussi...
What an Auditor Should Know about Cloud Computing Part 1
Blog Published: 04/06/2021
An Introduction to Cloud Terminology and General GovernanceWritten by Moshe Ferber, CCSK and CCAK InstructorThis is the first in a series of three blogs dealing with the essentials an auditor needs to know about cloud computing. In recent years, there has been a strong focus on building cloud pla...
Cloud Security Alliance Announces Rolling Call for Participation, Content for Virtual and In-person Global Events
Press Release Published: 04/01/2021
Subject matter experts invited to share expertise with cyber, cloud communitiesSEATTLE – April 1, 2021 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment, today ann...
CCSK Success Stories: From a Senior Executive
Blog Published: 04/01/2021
This is part of a blog series interviewing cybersecurity professionals who have earned their Certificate of Cloud Security Knowledge (CCSK). In these blogs we invite individuals to share some of the challenges they face in managing security for cloud computing and how they were able to leverage k...
Cloud Security Alliance Releases Latest Survey Report on State of Cloud Security Concerns, Challenges, and Incidents
Press Release Published: 03/30/2021
Survey finds that 58% of respondents are concerned about security in the cloud, while misconfigurations are one of the leading causes of breaches and outages, as public cloud adoption doubles over past two yearsSEATTLE – March 30, 2021 – The Cloud Security Alliance (CSA), the world’s leading orga...
Beware of Legitimate, but Compromised Websites
Blog Published: 03/30/2021
This blog was originally published by Ericom By Mendy Newman, Group CTO, International, Ericom SoftwareIt’s easy to get lulled into a false sense of security when visiting a website you know – “I navigated directly to xyz.com so I know this isn’t a spoofed site. Surfing here, even downloading thi...
How SDP Can Be Used to Thwart DDoS Attacks
Blog Published: 03/26/2021
By Shamun Mahmud, Senior Research Analyst and Standards Officer for the Cloud Security AllianceSoftware Defined Perimeter provides an integrated security architecture that is otherwise hard to achieve with existing security point products. We’ve seen tremendous growth in interest, enterprise adop...
5 Best Practices for Securing Microsoft Azure
Blog Published: 03/25/2021
This blog was originally published by OpsCompass.By John Grange from OpsCompass.Cloud adoption has led to a major shift in application security management. Unlike on-premises where the focus is more on perimeter security, cloud deployments demand a more holistic and integrated approach. Ensuring ...
Incident Response and Knowing When to Automate
Blog Published: 03/24/2021
This blog was originally published on Vectra.ai Measuring and improving total time of response is easier said than done. The reality is many organizations do not know their existing state of readiness to be able to respond to a cybersecurity incident in a fast, effective manner. And most don’t...
Planning Through Recovery: Five Things to Keep in Mind
Blog Published: 03/23/2021
By Bryan Sartin, Senior Vice President, Chief Services Officer, eSentirePlanning is everything. Just ask the Boy Scouts. While being caught in a downpour without an umbrella is certainly inconvenient, maybe even unpleasant, it pales in comparison to your organization experiencing a significant da...