11 Months to DORA: EU's New Framework For BFSI
Blog Published: 03/04/2024
Written by dora@auditcue.com, AuditCue.In September 2020, the European Commission unveiled a landmark proposal - the Digital Operational Resilience Act (DORA) - as part of its sweeping Digital Finance Package aimed at fortifying cybersecurity across EU financial institutions. Once finalized, D...
Evolving Email Threats: 5 Attacks to Watch For in 2024
Blog Published: 03/05/2024
Originally published by Abnormal Security.Written by Emily Burns. A new year means a new set of challenges across the email threat landscape. While traditional attack vectors are continuing to trend upward, there are also a number of novel attack types emerging. Threat actors have learned to b...
Adhere to the EU Cloud CoC through the CSA
Blog Published: 03/05/2024
Written by SCOPE Europe.It’s live - you can now adhere to the EU Cloud CoC through the CSA!With a shared mission of supporting the dissemination of trusted cloud services, the anticipated collaboration between the EU Cloud CoC and Cloud Service Alliance (CSA) is now live. In practice, this col...
How Do I Choose a SOC Auditor?
Blog Published: 03/06/2024
Originally published by MJD.Written by JC London, Senior Manager, CISA, CISSP, MJD. Q: How do I choose a SOC auditor?A: MJD Answer:Choosing the right auditor and audit team may seem like an uncomplicated process at first. You’ve done your research, asked ChatGPT for its opinion, and you feel l...
What are Non-Human Identities?
Blog Published: 03/08/2024
Originally published by Oasis Security.Written by Amit Zimerman, Co-founder & CPO, Oasis Security. A Non-Human Identity (NHI) is a digital construct used for machine-to-machine access and authentication. NHIs are pivotal in today's evolving enterprise systems, especially as organizations t...
Innovating Without Stagnating: Strategies for Security Remediation in 2024
Blog Published: 03/15/2024
Originally published by Dazz. Written by Jordan McMahon, Corporate Marketing, Dazz.In the fast-paced world of cybersecurity, staying ahead of threats while driving innovation is a delicate balance that requires teamwork and clarity. But as the recent CSA State of Security Remediation report no...
A Comprehensive Guide to Business Cyber Security
Blog Published: 03/14/2024
Originally published by CAS Assurance. In the digital age, online security is among the most critical factors for any business. As more and more people are living their lives online, security has become a priority for those giving up sensitive information – including financial data – via the W...
Defend Against Azure Cross-Tenant Synchronization Attacks
Blog Published: 03/15/2024
Originally published by CrowdStrike. Azure cross-tenant synchronization (CTS) was made generally available on May 30, 2023, and introduced a new attack surface on Microsoft Entra ID (formerly Azure Active Directory) where attackers can move laterally to a partner tenant or create a backdoor on...
Avoid IAM Drifts Using Explicit-Deny
Blog Published: 03/15/2024
Written by Israel Chorzevsk. Background Over the last decade, cloud providers advanced their authorization mechanism, and added more and more ways to grant access to resources. Having multiple ways to grant access may lead to authorization drifts. This post describes several authorization fea...
2024 State of Cloud Security Report Shows That More Risk Prioritization is Needed
Blog Published: 03/18/2024
Originally published by Orca Security. Written by Shir Shadon and Deborah Galea. Orca Security has released the 2024 State of Cloud Security Report, which leverages unique insights into cloud risks captured by the Orca Cloud Security Platform. Based on risks found in actual production envi...
How Pentesting Fits into AI’s ‘Secure By Design’ Inflection Point
Blog Published: 03/18/2024
Originally published by Synack. Written by James Duggan, Solutions Architect, U.K. and Ireland, Synack. The gamechanging potential of generative AI technology has caught the eye of attackers and defenders in the cybersecurity arena. While it’s unclear how the threat landscape will evolve with ...
Email Security Best Practices for 2024 (and Beyond)
Blog Published: 03/19/2024
Originally published by Abnormal Security. Written by Mike Britton. As we usher in a new year, the ever-evolving nature of cyber threats requires a proactive and informed approach. The past year in the security space was focused almost entirely on AI and its effects, with advances having a two...
Cloud Security: The Fundamental Role of Identities
Blog Published: 03/20/2024
Originally published by Tenable. Written by Christopher Edson, Senior Cloud Solutions Architect, Tenable. In the ever-expanding realm of the cloud, one thing is certain: vulnerabilities and misconfigurations are lurking just around the corner, waiting for attackers to exploit them and expose...
Pro-Active Approaches to Prepare Your Board of Directors for New SEC Cyber Security Rules
Blog Published: 03/21/2024
Originally published by RegScale. In March 2022, the Security and Exchange Commission (SEC) issued a proposed rule titled Cybersecurity Risk Management, Strategy, Governance, and Incident Disclosure. In it, the SEC describes its intention to require public companies to disclose whether their b...
Embracing Zero Trust: A Blueprint for Secure Digital Transformation
Blog Published: 03/08/2024
Written by the CSA Zero Trust Working Group.Zero Trust security has transitioned from a buzzword to a critical framework essential for safeguarding an organization’s assets. Recently released by CSA, Defining the Zero Trust Protect Surface offers a guide for organizations embarking on the firs...
Google Cloud’s CISO Phil Venables and Mandiant CEO Kevin Mandia to Headline Cloud Security Alliance AI Summit at 2024 RSA Conference
Press Release Published: 03/26/2024
Session will explore priorities for CXOs and Boards of Directors and offer actionable steps to implementing emerging technologiesSEATTLE – March 26, 2024 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and best practices to...
Five Lessons Learned From Okta’s Support Site Breach
Blog Published: 03/11/2024
Originally published by Valence. Written by Adrian Sanabria. On September 29th, 2023, security vendor 1Password discovered unauthorized activity in their Okta tenant. An employee unexpectedly received an email that they had requested a report listing Okta administrators. A 1Password employee h...
The Future Role of AI in Cybersecurity
Blog Published: 03/11/2024
Originally published by DigiCert.Written by Dr. Avesta Hojjati.With an estimated market size of $102 billion by 2032, it’s no secret that Artificial intelligence (AI) is taking every industry by storm. We all know the basic idea of AI – it’s like creating really clever computers by showing the...
Phishing in Azure Cloud: A Targeted Campaign on Executive Accounts
Blog Published: 03/11/2024
Originally published by Adaptive Shield.Written by Hananel Livneh.In recent weeks, a concerning wave of cyber attacks has been targeting Microsoft Azure environments, compromising crucial user accounts, including those of senior executives. Proofpoint researchers have identified an ongoing mal...
Taking Back Control: The Growing Appeal of On-Premise and Hybrid Solutions
Blog Published: 03/13/2024
Written by Ascertia. The digital age demands robust security and unwavering trust. While cloud-based solutions have dominated recent years, organisations across the globe are increasingly turning to on-premise and hybrid-based digital trust solutions. This blog explores the factors driving ...