Cloud Security Alliance Releases Cloud-Based, Intelligent Ecosystems - Redefining Intelligence & Driving to Autonomous Security Operations
Press Release Published: 12/10/2020
Document calls out five unique security challenges that can lead to adversaries' successSEATTLE – Dec. 10, 2020 –The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment, t...
Securely Implementing Salesforce as a IdP in a Multi-Org Architecture
Blog Published: 12/09/2020
Written by Aaron Costello is an Offensive Security Engineer at AppOmniBy focusing on streamlining access to applications and services, most enterprises have deployed tooling that allows consolidated login for quicker access to the resources their employees need to accomplish their day-to-day job ...
4 Lessons For Small Ecommerce Stores Trying To Improve Security
Blog Published: 12/04/2020
By Rodney Laws, Editor at Ecommerce PlatformsSecurity is tougher for small ecommerce stores. They don’t have weighty budgets allowing massive investment — and while they’re less likely to be targeted owing to their relative lack of popularity and revenue, their appeal lives in vulnerability. Afte...
CCSK Success Stories: From the Head Cybersecurity Architecture
Blog Published: 12/03/2020
This is part of a blog series interviewing cybersecurity professionals who have earned their Certificate of Cloud Security Knowledge (CCSK). In these blogs we invite individuals to share some of the challenges they face in managing security for cloud computing and how they were able to leverage k...
Cloud Network Security 101 Part 3: Azure Service Endpoints vs. Private Endpoints
Blog Published: 12/01/2020
By Becki Lee, Fugue, Inc.Originally published on Fugue’s Website on October 8, 2020Level: AdvancedReading Time: 4 minutesAzure offers two similar but distinct services to allow virtual network (VNet) resources to privately connect to other Azure services. Azure VNet Service Endpoints and Azure P...
Letting The Right One In: A Preamble to Device Trust
Blog Published: 11/26/2020
Written by Dave Lewis, Advisory CISO — Global at Duo I’m sorry, do I know you? A typical query that people may ask when confronted by an unknown person who walks up abruptly and starts asking them questions. Oddly though, this sort of response does not happen in many network environments. When so...
CSA Survey Finds Organizations are Shifting their Use of IAM Capabilities in 2021
Blog Published: 11/25/2020
The use of cloud services have continued to increase over the past decade. Particularly in the wake of the COVID-19 public health crisis, many enterprises' digital transformations are on an accelerated track to enable employees to work from home. CSA surveyed these organizations to better underst...
Roadmap to Earning Your Certificate in Cloud Security Knowledge (CCSK)
Blog Published: 11/24/2020
Updated on 7/15/24 to align with CCSK v5.In this blog we’ll be taking a look at how to earn your Certificate of Cloud Security Knowledge (CCSK), from study materials to the details of the exam. If you’re considering earning your CCSK, or just exploring the possibility, this will give you a good i...
Cloud Network Security 101: Azure Private Link & Private Endpoints
Blog Published: 11/24/2020
By Becki Lee, Fugue, Inc. | Originally published on Fugue’s Website on September 25th, 2020.Azure offers two similar but distinct services to allow virtual network (VNet) resources to privately connect to other Azure services. Azure VNet Service Endpoints and Azure Private Endpoints (powered by ...
3 Reasons Why You Need to Include a VRM Platform in 2021
Blog Published: 11/23/2020
This blog was originally published by Whistic here. 2020 has been an incredibly long year for all of us. Honestly, we’re ready to start afresh in 2021. As the past months have brought on some unique challenges for InfoSec teams, they have also revealed areas of opportunity and growth regarding ho...
Rent to Pwn the Blockchain - 51% Attacks Made Easy
Blog Published: 11/20/2020
By Kurt SeifriedThis article is not legal or investment advice. This article covers some aspects of 51% attacks (and 34% attacks and some other variations) in DeFi, and some potential solutions to prevent these attacks from succeeding. So where I say “51% Attack” I mean “all attacks where you get...
CCSK Success Stories: Common Pitfalls in Managing Outsourced Cloud Projects
Blog Published: 11/19/2020
This is part of a blog series interviewing cybersecurity professionals who have earned their Certificate of Cloud Security Knowledge (CCSK). In these blogs we invite individuals to share some of the challenges they face in managing security for cloud computing and how they were able to leverage k...
Cloud Security Alliance Opens Registration for CloudBytes Connect: From the SOC to the Boardroom
Press Release Published: 11/19/2020
Attendees can earn up to seven CPE credits while learning about C-Level cloud priorities, current threats, and state-of-the-art best practicesSEATTLE – Nov. 19, 2020 –The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awareness of best practices ...
The Multi-Factor Factor (or How to Manage Authentication Risk)
Blog Published: 11/18/2020
By Wendy Nathers, Head of Advisory CISOs at DuoAs we debate the necessity of various authentication factors, particularly for passwordless projects, it’s good to take a step back and remember how we got here. There are key three types of authentication:The 3 Key Types of Authentication1. “Somethi...
What is Cloud-Based Tokenization?
Blog Published: 11/17/2020
By Dillon Phillips from TokenExAs more technologies migrate to the cloud in pursuit of digital transformation, security is no exception. Many people are likely familiar with the term "cloud," but not everyone knows just what is cloud security. Overall, cloud computing offers an effective, afforda...
Cloud Security Alliance, Tiro Security Partner to Offer Complimentary Cloud Certification Exam to Cybersecurity Women, Minorities in nextCISO Program
Press Release Published: 11/17/2020
Program to help minorities advance career path to CISOSEATTLE – Nov. 17, 2020 –The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment, today announced that it has partner...
Circle - The Most Vital Cybersecurity Community
Blog Published: 11/16/2020
Written by Jaclyn Parton, Marketing Coordinator at CSA At CSA, building community is at the core of our mission. Since our beginning in 2009, CSA has been providing a forum through which diverse parties, such as CISOs, security practitioners, students, professors, and all of the cybersecurity pr...
Seven Steps to defining the art of the possible in DevOps
Blog Published: 11/14/2020
By Craig Thomas from the CSA Washington DC Chapter and VP of Engineering at C2 LabsWe all love buzzwords, and one over the last couple/few years has been DevOps. What in the world does it mean? I have talked to people that think it means Agile/SCRUM methodology, while others think it is just Dock...
California Privacy Rights Act: What Are the Consequences for Cloud Users?
Blog Published: 11/13/2020
Francoise Gilbert, DataMinding, Inc.California voters approved Proposition 24 on November 3, 2020, paving the way to the California Privacy Rights Act (CPRA), which, on January 1, 2023, will replace California’s current data protection law, the California Consumer Privacy Act (CCPA). CPRA slightl...
Cloud Network Security 101: Azure Virtual Network Service Endpoints
Blog Published: 11/12/2020
By Becki Lee, Fugue, Inc.Originally published on Fugue’s Website on October 8, 2020Level: AdvancedReading Time: 4 minutesMicrosoft Azure offers two similar but distinct services to allow virtual network (VNet) resources to privately connect to other Azure services. Azure VNet Service Endpoints an...