Architecture Drift: What It Is and How It Leads to Breaches
Blog Published: 03/22/2024
Mitigate the risks of architecture drift with application security posture managementOriginally published by CrowdStrike. Cybercriminals work around the clock to discover new tactics to breach systems. Each time a digital ecosystem changes, it can introduce a weakness for a threat actor to qui...
The Implications of AI in Cybersecurity - A Transformative Journey
Blog Published: 03/11/2024
The emergence of Artificial Intelligence (AI) stands as both a beacon of hope and a subject of intricate debate. This transformative technology, with its dual-edged potential, demands a careful examination of its implications in the realm of cybersecurity. The integration of AI into cybersecur...
CSA Community Spotlight: Propelling the Industry Forward with Larry Whiteside Jr.
Blog Published: 03/12/2024
Now 15 years old, the Cloud Security Alliance (CSA) is the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment. In 2009, CSA was officially incorporated and we released the first version of our Securit...
2023 Threat Intelligence Year in Review: Key Insights and Developments
Blog Published: 03/14/2024
Originally published by Microsoft Security.It has been an incredible year for Microsoft Threat Intelligence. The sheer volume of threats and attacks revealed through the more than 65 trillion signals we monitor daily has given us many inflection points, especially as we notice a shift in how t...
Cybersecurity Regulations and the Impact on Consumers
Blog Published: 03/13/2024
Originally published by RegScale.The theme for this year’s Cybersecurity Awareness Month, “Secure Our World,” underscores the importance of cybersecurity in our daily lives. This theme serves as a reminder that despite the convenience and connectivity of the digital age, there are inherent ris...
Lessons Learned from HIPAA Compliance Breaches
Blog Published: 03/13/2024
Originally published by BARR Advisory.Written by Claire McKenna. According to the Department of Health and Human Services (HHS) Office for Civil Rights (OCR), there has been a considerable upward trend in healthcare data breaches since the office began tracking data breach statistics in 2009. ...
Understanding and Preventing Business Email Compromise
Blog Published: 03/14/2024
Originally published by CXO REvolutionaries.Written by Gary Parker, CTO in Residence, Zscaler.Businesses of all sizes face a growing cybersecurity and financial threat known as business email compromise (BEC) simply because they use email. BEC attacks have become increasingly sophisticated, po...
National Cybersecurity Authority Drives Saudi Arabia's Essential Controls Framework (ECC)
Blog Published: 03/18/2024
Written by AuditCue.The Kingdom of Saudi Arabia's Essential Cybersecurity Controls (ECC), established by the National Cybersecurity Authority (NCA), is a significant leap towards enhancing the nation's cyber defense mechanisms. This set of regulations spans across five critical domains, emphas...
AI Safety vs. AI Security: Navigating the Commonality and Differences
Blog Published: 03/19/2024
Written by Ken Huang, Co-Chair of Two CSA AI Safety Working Groups, VP of Research of CSA GCR, and CEO of Distributedapps.ai. 1: Introduction Artificial intelligence (AI) safety and security are fundamental aspects that play distinct yet interconnected roles in the development and deployme...
What's Broken with Identity Management?
Blog Published: 03/25/2024
Originally published by Oasis Security. Written by Danny Brickman, Co-founder & CEO, Oasis Security. Identity management is a critical component of enterprise security. Identities are the key construct through which we control how authorized entities (individuals, software or devices) can ...
What Should the Scope Period Be for My SOC 2 Type 2 Report?
Blog Published: 03/25/2024
Originally published by MJD.Written by Mike DeKock, CPA, CEO, MJD.Q: What should the scope period be for my SOC 2 Type 2 report?A: MJD AnswerBefore I jump into the scope period for a SOC 2 Type 2, I wanted to quickly note the difference between a SOC 2 Type 1 report and a SOC 2 Type 2 report. ...
Quarterly Threat Bulletin Q4 2023: Current Cybersecurity Trends
Blog Published: 03/20/2024
Originally published by Uptycs.Uptycs’ Threat Research Team has released its final Quarterly Threat Bulletin for 2023, detailing cybersecurity trends and the cybersecurity threat landscape: the tactics, techniques, and procedures (TTPs) of the most active malware and prominent threat actor gro...
Threat Detection on a Cloud-Native Attack Surface
Blog Published: 03/20/2024
Originally published by Sysdig.Written by Anna Belak. Public cloud infrastructure is, by now, the default approach to both spinning up a new venture from scratch and rapidly scaling your business. From a security perspective, this is a brand new (well, by now more than a decade old) attack sur...
Zero Trust: Win Friends, Influence People, and Improve Your Organizational Maturity
Blog Published: 03/19/2024
Written by the CSA Zero Trust Working Group Co-Chairs: Jason Garbis, Jerry Chapman, and Christopher Steffen. In our roles as co-chairs, we spend a lot of time and energy talking with enterprises and promoting the idea that Zero Trust needs to be more than just a security initiative – it has to...
CSA Community Spotlight: Being a Force for Good with Risk Manager Heinrich Smit
Blog Published: 03/21/2024
In 2009, CSA was officially incorporated and we released the first version of our Security Guidance. The following year, CSA launched the industry’s first cloud security user certificate, the Certificate of Cloud Security Knowledge (CCSK), now the benchmark for professional competency in cloud...
Cybersecurity Frontiers: Unveiling CTI's Role in Mitigating Dark Web Risks
Blog Published: 03/25/2024
Written by Cetark. The dark web in the digital age presents a significant cybersecurity challenge. This secretive section of the internet, renowned for its anonymity, acts as a breeding ground for cyber threats. Nonetheless, Cyber Threat Intelligence (CTI) stands out as a beacon of hope, provi...
The 2023 State of SaaS Security Report
Blog Published: 03/27/2024
Originally published by Valence. Written by Adrian Sanabria. There’s something I love about putting together a big annual security report. The combination of data insights and industry trends is an opportunity to present a snapshot of the big picture. There’s the luxury of time we don’t have w...
For Game-Changing Cloud Workload Protection, Focus on Quality Over Quantity
Blog Published: 03/27/2024
Written by Tenable Cloud Security. The infamous Log4J software vulnerability shook the software industry in 2021 by catching much of the IT security community unprepared. Log4J is used in nearly every modern application, so the flaw impacted enterprise cloud services globally. What is the pref...
How to Secure Business-Critical Applications
Blog Published: 03/28/2024
Originally published by CrowdStrike. As organizations move more of their business-critical applications to the cloud, adversaries are shifting their tactics accordingly. And within the cloud, it’s clear that cybercriminals are setting their sights on software applications: In fact, industry da...
Security Compliance for Cloud Services
Blog Published: 03/29/2024
Written by Ashwin Chaudhary, CEO, Accedere. Cloud computing is a model for enabling on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management ...