Health3PT and HITRUST Solutions for Healthcare Risk Management
Blog Published: 09/08/2023
Originally published by BARR Advisory. A recently released survey conducted by Health3PT confirms 72% of vendors believe today’s third-party risk management practices are not effective. Health3PT and HITRUST Assurance Program have partnered together to provide capabilities and efficiencies to ...
Intelligent Augmentation: The Future of Human-AI Collaboration
Blog Published: 09/12/2023
Originally published by CXO REvolutionaries. Written by Greg Simpson, Former Chief Technology Officer, Synchrony. With the hype around large language models (LLMs) like Chat-GPT, knowing what a business should do can take time. Here’s my take on what every business needs to do regarding artifi...
5 Things You Need to Look for in CSPM
Blog Published: 09/12/2023
Written by Lena Fuks, Product Marketing Manager, Aqua Security. In a world increasingly reliant on cloud services, the protection of cloud environments is more critical than ever before. However, as these environments grow in complexity, and the risk of misconfiguration grows exponentially...
Behind the Eight-Ball: Why Companies Struggle with Penetration Risk
Blog Published: 09/08/2023
Originally published by Coalfire. Written by Adam Kerns, Managing Principal, Commercial Services: Product Development, Coalfire. Key takeaways:Cloud migration has exposed organizations to new risks such as misconfiguration, injection and encryption issues.To stay ahead of cybercrime in the new...
How the CISO Drives Value Across the Enterprise
Blog Published: 09/22/2023
Originally published by Coalfire. Written by Michael Eisenberg, Vice President, Strategy, Privacy, Risk, Coalfire. Key takeaways:CISOs must evaluate and present the Return On Security Investment (ROSI) in terms of security spend and business outcomes.To achieve positive ROI, CISOs should focus...
How Great CISOs Make SaaS Security a Priority for Business Leaders
Blog Published: 09/13/2023
Originally published by AppOmni. Written by Harold Byun, Chief Product Officer, AppOmni. CISOs and security leaders have wrestled with SaaS security program and policy adoption for decades. This perennial topic resurfaced in a recent podcast episode I participated in, where I shared how CISOs ...
Strategic IoT Security Considerations for CISOs and the C-Suite
Blog Published: 09/13/2023
An Evolution of Enterprise Infrastructure Cloud computing has evolved beyond enhancing traditional IT frameworks, positioning organizations at the forefront of innovation and expansion within the enterprise ecosystem. For today's C-suite, the integration and management of the vast realm of Int...
Maximizing Effectiveness with Incident Response Platforms
Blog Published: 09/13/2023
Written by Alex Vakulov. Over recent years, there has been an escalating number of cyber incidents, with the complexity of these attacks also on the rise. This growing menace has prompted both governments and businesses to place greater emphasis on bolstering their information security. In ...
How to Choose a Tokenization Solution
Blog Published: 09/14/2023
Originally published by TokenEx. Delivering payments security, compliance, and risk reduction via tokenizationThe power of tokenization continues to evolve—but not all approaches are equal.If you’re reading this, you’re likely researching solutions for your organization’s risk, PCI compliance,...
Ensuring Cloud Compliance Excellence with ISO Standards and CSA STAR
Blog Published: 09/14/2023
Originally published by MSECB. Written by Varun Prasad. Introduction Almost two decades since the advent of public cloud services, cloud computing continues to be a foundational building block that drives enterprise digital transformations and accelerates the delivery of new features to users....
Understanding the Shared Responsibility Model for Cloud Security: How To Avoid Coverage Gaps and Confusion
Blog Published: 09/14/2023
Originally published by Tenable. Written by Tom Croll, Advisor at Lionfish Tech Advisors. Cloud security’s shared responsibility model (SRM) concept is key for cloud adoption, yet it’s very confusing. In this post, you’ll learn how to use this model, what its limitations are and how to imp...
Reshaping Security Landscapes: The Essence of Cyber Transformation
Blog Published: 09/15/2023
Written by S Sreekumar, Vice President and Global Practice Head, Infra & Cloud Security, Cybersecurity & GRC Services, HCLTech and Andy Carelli, Senior Director, Ecosystems, GSI Solutions Management, Palo Alto Networks.Reshaping Security Landscapes: The Essence of Cyber TransformationT...
Exploring the Intersection of IAM and Generative AI in the Cloud
Blog Published: 09/15/2023
As generative AI (GenAI) becomes more prevalent, new challenges are emerging around identity and access management (IAM) within cloud environments. In this post, we explore the intersection of IAM and GenAI, how IAM enables and secures GenAI deployments in the cloud, and how GenAI capabiliti...
IoT Security and the Infinite Game
Blog Published: 09/19/2023
Originally published by CXO REvolutionaries. Written by Sam Curry, VP & CISO in Residence, Zscaler. A finite game, like a football game or a single game of chess, has a termination or metaphorical finish line where we can declare a winner or loser. An infinite game, however, is one where t...
Data Security Platforms: 9 Key Capabilities and Evaluation Criteria
Blog Published: 09/19/2023
Originally published by Dig Security. Written by Yotam Ben Ezra. What makes a cloud data security platform?Recent years have seen a flurry of new technologies and vendors - first in CSPM, then DSPM. Dozens of products have emerged, in addition to existing DLP vendors releasing cloud features a...
Digital Trust for Connected Medical Devices
Blog Published: 09/18/2023
Originally published by DigiCert. Written by Robyn Weisman. Connected medical devices, also known as IoMT (Internet of Medical Things), can dramatically improve patient health while minimizing the potential for harm. Infusion pumps illustrate this in a stark fashion. In 2010, Reuters reported ...
SOC 2 and ISO Certifications vs CSA STAR
Blog Published: 09/18/2023
I already have a SOC 2 Type 2 and ISO/IEC 27001 certification. Why would I want to upgrade to STAR?First, let’s set the stage with a discussion on scope and focus:STAR: The STAR certification is specifically designed for CSPs and assesses the security controls and practices related to cloud se...
Cloud Security Alliance Maps Cloud Controls Matrix (CCM) to Payment Card Industry Data Security Standard (PCI DSS) v4.0
Press Release Published: 09/19/2023
Mapping highlights areas of congruence and misalignment between CCM and PCI DSS standards, making it easier for payment processing services to mitigate riskBELLEVUE, WA – SECtember – Sept. 19, 2023 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining stan...
EU Cloud Code of Conduct Collaborates with Cloud Security Alliance to Further Harmonize GDPR Compliance
Press Release Published: 09/20/2023
New collaboration to further harmonize GDPR complianceBrussels and Seattle – Sept. 20, 2023 – Starting in November 2023 and through a specific framework, the Cloud Security Alliance (CSA) community will have access to an approved and European Data Protection Board (EDPB)-endorsed GDPR complian...
Cloud Security Alliance Awards 2023 Philippe Courtot Leadership Award to Schellman CEO Avani Desai
Press Release Published: 09/21/2023
Volunteers are also honored for outstanding efforts in advancing cloud security, cybersecurity worldwide with the Juanita Koilpillai and Chapter of Excellence Awards BELLEVUE, WA – SECtember – Sept. 21, 2023 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to def...