Remote working strategy: desktop virtualization or remote access?
Blog Published: 02/22/2021
This blog was originally published on Wandera.com.Written by Alex Wells from WanderaCreating a technology roadmap for your business can feel like an impossible task as there is always something new on the horizon that you need to account for. It doesn’t help that analysts are trying to predict th...
Cloud Security for SaaS Startups Part 1: Requirements for Early Stages of a Startup
Blog Published: 02/19/2021
Based on the Cloud Security for Startups guidelines written by the CSA Israel ChapterBackground Information security is a complicated subject even for mature enterprises, so it’s no wonder that startups find the area challenging. Planning, implementing and maintaining good-practice security are n...
How to Secure Your CDE and Achieve PCI DSS Compliance
Blog Published: 02/18/2021
Written by TokenExSuccessfully securing cardholder data should be top of mind as businesses try to keep up with the rise of data regulations and the resulting increased focus on consumer privacy. The process of securing a cardholder data environment (CDE) and ensuring it is compliant with the Pay...
How to choose a Zero Trust architecture: SDP or Reverse-Proxy?
Blog Published: 02/15/2021
This blog was originally published on Wandera.comWritten by Alex Wells at WanderaZero Trust Network Access (ZTNA) is the next generation access solution that is set to be a key part of IT administrators toolkits, displacing longstanding Virtual Private Networks (VPN). There are numerous factors a...
Abuse in the Cloud
Blog Published: 02/12/2021
Written By: Allan Stojanovic and Spencer Cureton from Salesforce, Inc.Join the new Cloud Abuse Circle Community, to participate in the discussion around this topic..When we talk about “abuse”, we use the term as shorthand for the much more encompassing “Abuse, Misuse, Malice and Crime” (with cred...
What is 3-D Secure Authentication, and Why Do I Need It?
Blog Published: 02/11/2021
Originally published by TokenEx. Written by Dillon Phillips. Thanks to the increasing popularity of ecommerce platforms, many card transactions that previously would have occurred in person can now be made online. The resulting rise in card-not-present (CNP) payments offers greater convenience fo...
Can Blockchains Survive the Quantum Computer?
Blog Published: 02/09/2021
Suppose you were asked to rank the most significant innovations in IT over the last few years. What would come to your mind? It is very likely that both blockchain and quantum technologies would come close to the top of your list.Blockchains promise the secure exchange of digital assets (such as ...
Give us your feedback on potential CPE course topics
Blog Published: 02/08/2021
CSA is looking for input from the cybersecurity community on what topics you all would like to see in our new CPE course series. What subject areas would you be most interested in learning more about? Let us know by taking this 2 question survey here!Some potential course topics include: Cloud Ke...
How to avoid the biggest mistakes with your SaaS security
Blog Published: 02/08/2021
This blog was originally published on Wandera.comWritten by Alex Powell at WanderaThe biggest mistakes in SaaS securityThe popularity of SaaS applications for businesses continues to grow with 95% of businesses hosting sensitive information in the cloud. Traditional security models and boundary-f...
Benefits of the CCSK in Your Job Search
Blog Published: 02/07/2021
Considering whether or not to earn your Certificate of Cloud Security Knowledge (CCSK)? Obviously, we are biased, but Michael Benavidez, a Technical Writer at Securitas, was kind enough to share his experience earning the CCSK and how that impacted his job search.Michael Benavidez’s Experience Ea...
3 Data Strategies that will be Critical for Surviving 2021
Blog Published: 02/05/2021
By: Jim McGann, Vice President Marketing and Business Development, Index EnginesUsers create content on a daily basis. Much of this content has no long-term value and is not business critical, however, a small percentage is key to running operations. Some of it contains sensitive client informa...
CCM v4 FAQ - Transition Timeline
Blog Published: 02/04/2021
This blog was updated on 12/17/21 with the latest information regarding the release of CCM v4 components.On January 21st CSA released version 4 of the Cloud Controls Matrix (CCM). The new version ensures coverage of requirements deriving from new cloud technologies, new controls and enhanced int...
Cloud Security Alliance Announces 2021 CSA Research Fellows
Press Release Published: 02/04/2021
Award honors volunteers for significant accomplishments, contributions to CSA researchSEATTLE – Feb. 4, 2021 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications and best practices to help ensure a secure cloud computing environmen...
The Evolution of Cloud Computing and the Updated Shared Responsibility
Blog Published: 02/04/2021
Written by Vishwas Manral, Founder and CEO at NanoSec, CSA Silicon Valley Chapter.Cloud computing has changed over the last 10 years. This blog captures the reason why the original service models are no longer sufficient as a result of the changes in the cloud landscape with the growth of Contain...
Transitioning Traditional Apps into the Cloud
Blog Published: 02/03/2021
Contributed by IntezerFor organizations, cloud adoption is the primary driver of digital transformation and modernizing traditional applications to cloud constructs is a major milestone. Cloud opens up a world of opportunities, with a choice of IaaS, PaaS, and SaaS as deployment models.Organizati...
2020 Hindsight and 2021 Foresight – Lessons Learned and Predictions for the Velocity of Business
Blog Published: 02/01/2021
By Ravi Balupari, Founder & CTO, CloudVector This blog originally was published by CloudVectorThey say that hindsight is 2020, which has certainly been the case this year. For most organizations, 2020 orchestrated a fundamental shift to the way we work. The paradigm shift to work from home ha...
CCSK Success Stories: from a Cybersecurity Engineer
Blog Published: 01/31/2021
In this blog series we invite individuals to share some of the challenges they face in managing security for cloud computing and how they were able to leverage knowledge from the Certificate of Cloud Security Knowledge (CCSK) in their current roles. In this blog we'll be interviewing Lucas, a Cyb...
Resources to Help Address Cybersecurity Challenges in Healthcare
Blog Published: 01/29/2021
By Vince Campitelli, Co-Chair for the CSA Health Information Management Working Group (HIM)According to a 2019 Thales Report (3) 70% of healthcare organizations surveyed reported a data breach, with a third reporting a breach within the last year. All organizations surveyed reported collecting, ...
Cloud Workload Security: Part 4 - Explaining the Security Features of GCP
Blog Published: 01/28/2021
Written by IntezerWhen it comes to securing your workloads in the cloud, having a well-defined security strategy with the right controls means that the battle is only half won. This series explains the important security controls and categories that can help you build a strong cloud security stra...
Cloud Security Alliance’s New Internet of Things (IoT) Security Controls Framework Allows for Easier Evaluation, Implementation of Security Controls within IoT Architectures
Press Release Published: 01/28/2021
Updated Framework simplifies categorization of controls into new set of domains, minimizes control allocation to components within an IoT architectureSEATTLE – Jan. 28, 2021 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications and b...