Cloud 101CircleEventsBlog
Discover the latest cloud threats, evolving AI risks, and how to stay ahead. Don’t miss CSA’s free Cloud Threats & Vulnerabilities Summitregister now!

All Articles

All Articles
Security Considerations for Hardware Security Module as a Service

Blog Published: 06/07/2024

A hardware security module (HSM) is a trusted platform for performing cryptographic operations and protecting keys. A main feature of the HSM architecture is its special co-processor that performs cryptography functions. HSMs also consist of a hardware-based random number generator, RAM, stora...

AWS S3 Bucket Security: The Top CSPM Practices

Blog Published: 06/10/2024

Written by ArmorCode.An S3 bucket is a fundamental resource in Amazon Web Services (AWS) for storing and managing data in the cloud. S3 stands for "Simple Storage Service," providing scalable, durable, and highly available object storage.S3 is widely used for various purposes, such as storing ...

Discover CCSK v5: The New Standard in Cloud Security Expertise

Blog Published: 06/12/2024

Written by Martin Hall.Already trusted by thousands of companies and tens of thousands of cloud security professionals worldwide, the Certificate of Cloud Security Knowledge (CCSK) is the industry standard for cloud security expertise. And it's about to get even better. Based on input from our...

Beyond Blind Trust: The Imperative of Zero Trust for Federal Agencies

Blog Published: 06/13/2024

Originally published by Synack.Written by Ed Zaleski. Director of Federal Sales for the Department of Defense, Synack.TL;DRZero trust cybersecurity principles require continuous monitoring and evaluation to ensure effectiveness.Implementing zero trust necessitates a significant overhaul of exi...

Mastering Zero Trust Security in IT Operations

Blog Published: 06/14/2024

Originally published by Automox.Written by Landon Miles.If you’re unaware that cyber threats are becoming more sophisticated and frequent, you probably don’t work in IT. Unfortunately, the traditional "trust but verify" approach to cybersecurity just isn’t adequate anymore. A Zero Trust securi...

5 Best Practices to Secure AWS Resources

Blog Published: 06/17/2024

Originally published by CrowdStrike.Organizations are increasingly turning to cloud computing for IT agility, resilience and scalability. Amazon Web Services (AWS) stands at the forefront of this digital transformation, offering a robust, flexible and cost-effective platform that helps busines...

Risk Management in the Age of Artificial Intelligence: 9 Questions to Ask Your AI-Powered Vendors

Blog Published: 06/11/2024

Originally published by BARR Advisory.Artificial intelligence (AI) presents organizations across industries with the opportunity to streamline their workflows, better secure their systems, and solve some of the world’s most pressing issues. But while AI has the potential to offer huge benefits...

SASE and Zero Trust PAM: Why Enterprises Need Both

Blog Published: 06/12/2024

Written by StrongDM.Enterprise security and compliance teams must maintain constant awareness of all activities across their entire environment involving every user. Regulatory requirements, along with internally set policies and controls, demand thorough knowledge and understanding to effecti...

What We Know About Vulnerability Exploitation in 2024 (So Far)

Blog Published: 06/12/2024

Originally published by Dazz.Written by Noah Simon, Head of Product Marketing, Dazz.In the world of security vulnerabilities, change is the only constant. There are always new CVEs, new exploits, and new threat actors. A recent study estimates that there will be a 25% increase in vulnerabiliti...

5 ChatGPT Jailbreak Prompts Being Used by Cybercriminals

Blog Published: 06/17/2024

Originally published by Abnormal Security.Written by Daniel Kelley.Since the launch of ChatGPT nearly 18 months ago, cybercriminals have been able to leverage generative AI for their attacks. As part of its content policy, OpenAI created restrictions to stop the generation of malicious content...

From the Trenches: A CISO's Guide to Threat Intelligence

Blog Published: 06/13/2024

Originally published by CXO REvolutionaries.Written by Ben Corll, CISO in Residence, Zscaler.Let's face it, our jobs as CISOs are a constant dance with the shadows. We fight invisible enemies, anticipate the next attack, and strive to stay one step ahead of ever-evolving threats. That's where ...

Unified Cybersecurity Language: Optimizing Risk and Compliance Terms for Collaborative Security

Blog Published: 06/18/2024

Originally published by RegScale.Written by Dave Schmoeller.Kickoff: Navigating the Cybersecurity Language LandscapeImagine the chaos when a cybersecurity breach puts data at risk, and departments are left in a scramble. Cybersecurity tags the event a ‘security incident,’ Risk counters with a ...

New Threat Detected: Inside Our Discovery of the Log4j Campaign and Its XMRig Malware

Blog Published: 06/18/2024

Originally published by Uptycs. Written by Shilpesh Trivedi and Nisarga C M. The Uptycs Threat Research Team has uncovered a large-scale, ongoing operation within the Log4j campaign. Initially detected within our honeypot collection, upon discovery, the team promptly initiated an in-depth anal...

CSA Community Spotlight: Leading Critical Discussions with Vishwas Manral

Blog Published: 06/14/2024

Celebrating our 15th anniversary this year, CSA stands as the premier authority in promoting and defining best practices for a secure cloud computing environment. Since its inception in 2009, CSA has grown to offer an extensive array of frameworks, research publications, assurance programs, tr...

Dmitri Alperovitch’s Vision for Cyber Defense

Blog Published: 06/24/2024

Originally published by Automox.Episode SummaryIn this episode of the CISO IT podcast, host Jason Kikta interviews Dmitri Alperovitch, author of the book 'World on the Brink' and chairman of Automox's board. They discuss the evolution of IT and cybersecurity over the past few decades, the impo...

AI Resilience & Diversity

Blog Published: 06/20/2024

Written by Dr. Chantal Spleiss, Co-Chair of the CSA AI Governance and Compliance Working Group. Resilience is often thrown around as a buzzword, but its true definition can be quite elusive. In this blog, I'll explore the three pillars of AI resilience: robustness, resilience, and plasticit...

How a CNAPP Can Take You from Cloud Security Novice to Native in 10 Steps

Blog Published: 06/25/2024

Originally published by Tenable. Written by Shai Morag. Security professionals are used to protecting on-premises resources, but the cloud is more complex than on-prem – especially in multi-cloud environments. Meanwhile, breaches are happening at a furious pace. The new Tenable 2024 Clou...

Cloud Security in 2024: Addressing the Shifting Landscape

Blog Published: 06/27/2024

Written by Thales.As cloud infrastructures become integral to business operations, securing them is climbing the priority ladder for businesses in every sector. In fact, cloud security is a top concern for nearly two-thirds (65%) of security and IT management professionals now, and 72% claim i...

Dumping a Database with an AI Chatbot

Blog Published: 06/27/2024

Originally published by Synack.Written by Kuldeep Pandya.We’re seeing AI chatbots a lot these days. They’re everywhere from Notion to AWS Docs. Many companies have started implementing their AI chatbots either using OpenAI API or a custom AI model.While making these AI chatbots is easy, the ut...

PCI DSS for Security Leaders – How to Take a Proactive Approach

Blog Published: 06/20/2024

Originally published by Schellman.If you’re a newly hired CISO or Director for an organization that’s required to achieve and maintain PCI DSS, you may be wondering how and where you can get started so that you’re ready when it comes time for the assessment to begin.No one wants to hear, “I’m ...

Looking for the CCM?

Start using the Cloud Controls Matrix to simplify compliance with multiple standards & regulations.