Change These 7 Security Settings After Creating a New AWS Account
Blog Published: 11/17/2022
Originally published by Varonis. Written by Shane Waterford, Varonis. If you’ve just created your Amazon Web Services (AWS) account and are worried about AWS data security, you have a valid reason — unknown organization-wide settings or simple misconfigurations could put your data at risk of e...
The New ISO/IEC 27001:2022 Standard’s Impact on the CSA STAR Certification
Blog Published: 11/18/2022
Written by Ashwin Chaudhary, CEO, Accedere. Introduction The most awaited third edition of ISO/IEC 27001:2022 was published on 25th October 2022, after the publication of ISO 27002:2022 in February 2022. If you are planning on transitioning to the newly updated standard, then your major focu...
IoT Vulnerabilities and Security Concerns
Blog Published: 11/19/2022
Internet of Things (IoT) devices (also known as "smart devices") represent a wide variety of internet-connected devices. This includes medical devices, cars, drones, simple sensors, and more. They often pose a security challenge because of their limited size and the difficulty of securing IoT ...
Anatomy of a Cyber Attack (and What You Can Do About It)
Blog Published: 11/18/2022
Originally published by TrueFort. Written by Matt Hathaway, TrueFort. Security criminals know how IT and security operations work in organizations. They know and exploit common weaknesses. To effectively protect against them, security teams need to turn the tables and get inside the attackers’...
CSA Chapter Success Story: An Interview with the Japan Chapter Director
Blog Published: 11/19/2022
CSA’s chapters are made up of security professionals who volunteer to increase cloud security awareness in their local area and provide outreach for CSA research, education, and training resources. They work to solve cloud vulnerabilities and challenges by collaborating with other local expert...
Inoculate Your Company Against Security Data Gaps to Develop Cyber Immunity
Blog Published: 11/21/2022
Written by Arti Raman, CEO and Founder, Titaniam. Protecting sensitive customer data, or personally identifiable information (PII), is a high priority for companies in verticals ranging from financial services to healthcare and retail. Chief information security officers (CISOs) for these ...
Diving Deeply into IAM Policy Evaluation – Highlights from AWS re:Inforce IAM433
Blog Published: 11/21/2022
Originally published by Ermetic. Written by Noam Dahan, Ermetic. IAM433 has a good explanation of how and why permissions boundaries can be circumvented by resource policies. There’s a repeat tomorrow but it’s not recorded (chalk talk). This presentation should be made public and linked from...
Top 5 Configurations to Check When Setting Up a New SaaS App
Blog Published: 11/21/2022
Originally published by Adaptive Shield. Written by Hananel Livneh, Adaptive Shield. The old days of buying new software, installing it on the company servers, and making sure everything works is gone. All hail the new IT king - SaaS platforms. Ready to go from the start, no installation neede...
How to Use Threat Intelligence to Combat Targeted Attacks
Blog Published: 11/23/2022
Written by Alex Vakulov Threat Intelligence (TI) is one of the most complex and, at the same time, important elements of information security. Threat Intelligence collects information about hacker groups, their techniques and tactics. It provides threat prediction, helps detect attacks, and su...
Beating IT’s Bad Rap: How CXOs Can Maintain a Positive Corporate Presence
Blog Published: 11/23/2022
Originally published by CXO REvolutionaries. Written by Gary Parker, Field CTO - AMS, Zscaler. Winston Churchill famously said, “never let a good crisis go to waste.” But, if a CXO only appears in front of the board when trying to keep their job after a cyber incident, a crisis may well lay wa...
Top Threat #9 to Cloud Computing: Misconfiguration and Exploitation of Serverless and Container Workloads
Blog Published: 11/20/2022
Written by the CSA Top Threats Working Group.The CSA Top Threats to Cloud Computing Pandemic Eleven report aims to raise awareness of threats, vulnerabilities, and risks in the cloud. The latest report highlights the Pandemic Eleven top threats, in which the pandemic and the complexity of work...
CCSK Success Story: From an IT and Cloud Security Manager
Blog Published: 11/23/2022
This is part of a blog series interviewing cybersecurity professionals who have earned their Certificate of Cloud Security Knowledge (CCSK). In these blogs we invite individuals to share some of the challenges they face in managing security for cloud computing and how they were able to leverag...
Removing the Fog from Cloud Compliance
Blog Published: 11/22/2022
Originally published by Axonius. Written by Shlomit Alon, Axonius. “When I was told our company needs to ensure we’re cloud compliant, I was scratching my head, unsure where to begin.”Does that quote sound familiar? A risk analyst at a company wasn’t sure where to reduce risks in the forebodi...
Cloud First, Security Second?
Blog Published: 11/22/2022
Originally published by Thales. Written by Chad Couser, Director, Marketing Communications, Thales. Cloud solutions were a lifesaver for organizations during the height of the COVID-19 pandemic as employees worked remotely or went hybrid and businesses pivoted their technology strategies to ke...
Web 3.0 Security Issues: What Your Company Needs to Know for 2023
Blog Published: 11/22/2022
Originally published by TokenEx. Written by Anni Burchfiel, TokenEx. The world wide web had its first major shift when blogging and forum capabilities were added to web alongside the established collection of static company websites. The ability for anyone to add their own content to the web, ...
Tailoring Your Zero Trust Transformation to Your Pain Points
Blog Published: 11/28/2022
Originally published by CXO REvolutionaries. Written by Gary Parker, Field CTO - AMS, Zscaler. Zero trust is often likened to a journey. And, as the proverb says, even a journey of a thousand miles begins with a single step.But where to start? For better or for worse, there’s no single embarka...
An Interview with One of the Developers of CSA’s Zero Trust Training
Blog Published: 11/22/2022
These days, Zero Trust is a term that you can’t seem to get away from - and you shouldn’t want to! Zero Trust is based on the principle that no part of a computing and networking system can be implicitly trusted, including the humans operating it. This concept codifies an evolutionary approach...
The Hidden Costs of Appliance-Based Models
Blog Published: 11/30/2022
Originally published by Netography. Written by Martin Roesch, Netography. In the network security game, deep packet inspection (DPI) technologies are primarily delivered on appliance-based architectures, an approach suffering from major evolutionary pressure due to pervasive network encryption...
‘Cyber Isolationism’ is Making CXOs’ Jobs More Complicated – And More Critical
Blog Published: 11/30/2022
Originally published by CXO REvolutionaries. Written by Simon Hodgkinson, former CISO, BP. Is globalization in decline? Put this question to a group of economists, diplomats, social scientists, or other specialists, and you’d likely kick off a long and spirited debate with representatives on b...
Password Hash Cracking, User Cloning, and User Impersonation: Three Risks Every SAP Customer Should Know
Blog Published: 11/28/2022
Originally published by Onapsis. Written by Thomas Fritsch, Onapsis. The easiest (and a significantly profitable) way for attackers to get into a system is logging in with valid user credentials. According to a recent report, breaches that are caused by stolen or compromised credentials are no...