Cloud Explosion Catapults Privileged Access Management and Identity Security to the Forefront
Blog Published: 03/22/2021
By Justyna Kucharczak from CyberArk 2020 introduced a host of unexpected challenges for cybersecurity teams. Not only must they protect increasingly complex IT environments, they’re now charged with deploying new models to enable mobile and geographically dispersed workforces. As they move for...
CCAK Testimonials: From a Cybersecurity Consultant
Blog Published: 03/22/2021
The Certificate of Cloud Auditing Knowledge (CCAK) is the first credential available for industry professionals to demonstrate their expertise in the essential principles of auditing cloud computing systems. The CCAK credential and training program will fill the gap in the market for technical ed...
Cloud Security Alliance and ISACA Announce Availability of Industry's First Cloud Auditing Credential, the Certificate of Cloud Auditing Knowledge (CCAK)
Press Release Published: 03/22/2021
CCAK demonstrates the knowledge and skills needed to address the nuanced challenges in auditing cloud environmentsSEATTLE – March 22, 2021 – The Cloud Security Alliance® (CSA) and ISACA® today announced the launch of Certificate of Cloud Auditing Knowledge™ (CCAK™), the industry’s first global, v...
CCSK Success Stories: From an IT Security Consultant
Blog Published: 03/19/2021
This is part of a blog series interviewing cybersecurity professionals who have earned their Certificate of Cloud Security Knowledge (CCSK). In these blogs we invite individuals to share some of the challenges they face in managing security for cloud computing and how they were able to leverage k...
Locking Down the Security of AWS IAM
Blog Published: 03/18/2021
This blog was originally published by Fugue, Inc. By Becki Lee, Head Technical Writer, Fugue, Inc. This blog post helps cloud engineers think more critically about cloud misconfiguration — why it occurs, how malicious actors exploit it, and ways to prevent it. Why AWS IAM? Cloud misconfig...
Investment in Cybersecurity During a Recovering Economy
Blog Published: 03/17/2021
This blog was originally published by TokenEx.Written by Alex Pezold, Co-Founder and CEO at TokenEx.Over a year of economic uncertainty driven by the pandemic has led organizations to re-evaluate their budgets. If one thing is apparent, it is that investing in cybersecurity must be a top priority...
Incident Response and the Need for Speed
Blog Published: 03/16/2021
This blog was originally published on Vectra.ai When a cyberattack occurs, most aspects of the threat are not under the control of a targeted organization. These range from who is targeting them, what is the motivation, where and when the attack occurs, how well-equipped and skilled that attac...
Cloud Security Alliance Releases Additional Mappings, Update to Cloud Controls Matrix (CCM) v4
Press Release Published: 03/15/2021
Updates allow for streamlined transition to, compliance with CCM v4 and ISO standardsSEATTLE – March 15, 2021 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment, to...
Threat Hunting and Incident Response in Azure Environments
Blog Published: 03/15/2021
This blog was originally published on Garland Technology's website.Contributed by Vijit Nair from Corelight. When cyber-attacks cross the network, grabbing quality and relevant data from network traffic is essential for security operations. This is especially pertinent in cloud environments whe...
CCSK Success Stories: From a Cloud Digital Security Architect
Blog Published: 03/11/2021
In this blog series we invite individuals to share some of the challenges they face in managing security for cloud computing and how they were able to leverage the Certificate of Cloud Security Knowledge (CCSK) in their current roles. In this blog we'll be interviewing Yogesh, a Cloud Digital Sec...
Taking a Practical Timely Opportunity to Evaluate the Security of Your Cloud Video Surveillance Solution
Blog Published: 03/10/2021
Written by Stan Mierzwa, M.S., CISSP, Director and Lecturer, Kean University Center for Cybersecurity and Eliot Perez, IT Security Analyst, CSA NJ Chapter These days, it is not unusual to walk too far before you see the endpoint of a video surveillance system. Consider the cameras you have see...
Do You Really Need Kubernetes?
Blog Published: 03/10/2021
This article was originally published on Intezer's blog. Kubernetes is one of the top open-source container orchestration projects, as it dramatically simplifies the creation and management of applications by providing built-in solutions to common problems. Although Kubernetes can be a solution f...
The Age of Collaborative Security
Blog Published: 03/09/2021
Written by: Philippe Humeau, CEO, CrowdSecThe Cloud Security Alliance was born from a need, the need to collaborate, whether we are partners or competitors, for the greater good of our industry and its customers. That’s what alliances are made for, to become stronger together.Security wise, few a...
PCI Compliance Checklist: Ensure Compliance
Blog Published: 03/08/2021
Originally published on TokenEx's blog. You’ve heard about all of the breaches. You know no defense is impenetrable. And you’re likely aware of the risk that comes with storing payment card information.Still, you need to process cardholder data to run your business—that much is unavoidable. So, h...
Transforming Your IT Risk Management from Reactive to Proactive in 5 Steps
Blog Published: 03/04/2021
This blog was originally published on Hyperproof's blog.Written by Jingcong Zhao, Director of Content Strategy at HyperproofAs a seasoned IT risk management professional, you already know that staying on top of security is a constant battle. You probably also know that managing IT risks proactive...
CCAK Frequently Asked Questions
Blog Published: 03/02/2021
What is the Certificate of Cloud Auditing Knowledge? The Certificate of Cloud Auditing Knowledge (CCAK) is a credential that industry professionals can obtain to demonstrate their expertise in understanding the essential principles of auditing cloud computing systems. This credential leverages CS...
A Powerful New Approach to Phishing – the Biggest Issue for Cybersecurity
Blog Published: 03/02/2021
Originally published on Ericom's blog.By Nigel Willis, Ericom Group CTO for EMEAPhishing attacks – which start with emails that appear to come from a legitimate company but are really devised by cybercriminals – are the top delivery mechanism for ransomware. Phishing takes full advantage of human...
CSA STAR Attestation and STAR Certification Case Studies
Blog Published: 02/28/2021
As organizations look to cloud services to process more sensitive and critical data, security and risk management teams require tools to quickly assess and understand the types and rigor of security controls applied by cloud service providers. The CSA STAR Attestation and Certification are the fi...
2020 Hindsight and 2021 Foresight: Lessons Learned in the Work From Home Era
Blog Published: 02/26/2021
By Lebin ChengOriginally posted by CloudVector It is hard to believe that it has already (or only?) been a year since a global pandemic forced organizations to adapt to the “new normal” of the work from home era. Given the 12-month milestone, now seems like the perfect time to stop and reflect on...
Building Confidence in Quantum-Resistant Algorithms: How much analysis is needed?
Blog Published: 02/25/2021
Written Roberta Faux, Lead Author and Quantum-safe Security Working Group MemberThe CSA Quantum-Safe Security Working Group has produced a new white paper, “Confidence in Post Quantum Algorithms.” This paper attempts to measure the published analysis of post-quantum or quantum-resistant cryptogra...