The Danger of Sharing Files with “Anyone with the Link”: Examining a Risky Google Drive Misconfiguration
Blog Published: 07/30/2024
Originally published by Valence.Often when it comes to security, a significant risk results from an action that is so easy that we tend to overlook the risk itself. Sharing a file using the “anyone with the link” option is the equivalent of leaving a treasure chest unlocked, overflowing with s...
How Time, Entitlements and Approvals (TEA) Can Secure the Keys to Your Cloud
Blog Published: 07/31/2024
Originally published by CyberArk.Written by Mike Bykat.A popular topic of conversation in my day-to-day work is how to secure privileged access to cloud management consoles and workloads. And that’s no surprise, considering more and more applications and workloads are migrating to the cloud.Up...
Breach Debrief: Snowflake MFA Meltdown Creates Data Leak Blizzard
Blog Published: 07/31/2024
Originally published by Adaptive Shield.Written by Maor Bin, CEO & Co-Founder, Adaptive Shield.On May 27, a threat actor group called ShinyHunters announced that it was selling 560 million records stolen in a data breach. The records include names, email addresses, physical addresses, and ...
Zooming In: 6 Ways Cybercriminals Use the Black Market to Steal Zoom User Data
Blog Published: 08/01/2024
Originally published by Abnormal Security.In the wake of the COVID-19 pandemic, video conferencing platforms like Zoom experienced an unprecedented surge in popularity. However, this increased usage also attracted the attention of cybercriminals who sought to exploit the platform's growing use...
Surviving LockBit: Lessons from a Ransomware Attack
Blog Published: 08/05/2024
Originally published by Pentera.Written by Zachary Lewis, AVP IT & CISO, University of Health Sciences and Pharmacy in St. Louis.On April 13, 2023, we were hit hard. The University of Health Sciences and Pharmacy (UHSP) faced a serious adversary: The notorious LockBit ransomware group. It ...
Accedere's Perspective on the CrowdStrike Incident
Blog Published: 08/05/2024
Editorial Note: The lessons learned and changes that may result from this incident may take quite some time to fully understand. CSA is providing a platform for member experts to weigh in on this issue. The opinions of this article represent those of the member, not those of CSA.Written by Ash...
Transforming Data Security: How AI and ML is Shaping the Next Generation of Data Security Tools
Blog Published: 08/08/2024
Originally published by Cyera.Written by Yana Fesh.Learn how AI-powered classification is transforming legacy Data Security Posture Management (DSPM) and providing accurate, autonomous insight into your data risk. Understand the limitations of traditional rules-based DSPM and why organizations...
Cloud Migration Simplified: SaaS Secrets and PAM Strategy
Blog Published: 08/09/2024
Originally published by CyberArk.Written by John Walsh. In the era of rapid digital transformation, organizations are prioritizing cloud transformation projects to enhance their operational agility, scalability and cost efficiency. However, this shift takes time and brings significant chall...
A Cybersecurity Expert's Perspective on the CrowdStrike Incident
Blog Published: 08/09/2024
Editorial Note: The lessons learned and changes that may result from this incident may take quite some time to fully understand. CSA is providing a platform for individual experts to weigh in on this issue. The opinions of this article represent those of the author, not those of CSA.Written by...
PCI 4.0 Simplified
Blog Published: 08/12/2024
Originally published by CyberGuard Compliance.Challenges in Implementing PCI 4.0Implementing PCI 4.0 comes with its fair share of challenges. The new standard introduces stricter requirements and more complex security measures to protect sensitive data. It may require significant changes to yo...
Unmasking the Cyber Threat Within: Federal Government and DOD Grapple with Sleeper Cells
Blog Published: 08/14/2024
Originally published by Synack.Written by Ed Zaleski, Director of Federal Sales for the Department of Defense, Synack.The federal government and the Department of Defense (DOD) wage a constant battle against an elusive enemy. Behind the scenes, sleeper cells of adversaries lurk inside the wire...
The Future of Cybersecurity Compliance: How AI is Leading the Way
Blog Published: 08/05/2024
Written by Gagan Koneru, Cyber Security Manager, GRC, FICO.Artificial Intelligence (AI) can transform cybersecurity compliance, enhance risk management, and prepare businesses to face new challenges as it makes its way into our personal and professional lives. Let us check out the latest innov...
The CCZT Program: Built for the Industry, By the Industry
Blog Published: 08/02/2024
The CSA Security Update podcast is hosted by John DiMaria, Director of Operations Excellence at CSA. The podcast explores the CSA STAR program, cloud security best practices, and associated technologies. In this blog series, we edit key podcast episodes into shorter Q&As. Today’s post feat...
Imagine GRC in 2030: a Q&A with RegScale’s Travis Howerton
Blog Published: 08/06/2024
Originally published by RegScale.Digital transformation, a raft of new state and federal regulations, and the exponential pace of change are quickly disrupting governance, risk, and compliance (GRC) processes for organizations and the CISOs who manage them. Big changes are ahead leading up to ...
Cloud Security Alliance Releases Top Threats to Cloud Computing 2024 Report
Press Release Published: 08/06/2024
Results highlight growing trust in the cloud as traditional cloud security concerns lessen in importanceSEATTLE and Black Hat Conference (Las Vegas) – Aug. 6, 2024 – Traditional cloud security issues often associated with cloud service providers (CSPs) are continuing to decrease in importance,...
Cloud Security Alliance Addresses Using Artificial Intelligence (AI) for Offensive Security in New Report
Press Release Published: 08/07/2024
Paper explores the unique transformative potential, challenges, and limitations of Large Language Model (LLM)-powered AI in offensive securitySEATTLE and Black Hat Conference (Las Vegas) – Aug. 7, 2024 – Today, the Cloud Security Alliance (CSA), the world’s leading organization dedicated to de...
CSA Community Spotlight: Contributing Something Meaningful with Head of Security Partha Chakraborty
Blog Published: 08/07/2024
For the last 15 years, CSA has been contributing to the cybersecurity community with our many research publications, trainings, blogs, in-person and virtual webinars and events, and many other initiatives based on top-of-mind security concerns. This thought leadership and event content is prod...
The Top 7 Questions We Get Asked about CTEM
Blog Published: 08/07/2024
Originally published by Dazz.Written by Jordan McMahon, Corporate Marketing, Dazz.I’m not ashamed to admit I’m a massive sucker for videos featuring hilarious moments captured by Ring doorbells.Like this one.And this one.And definitely all of these.Round-the-clock monitoring has become essenti...
The Hydra Effect: Why Shutting Down RaaS is Like Playing Whack-a-Mole
Blog Published: 08/07/2024
Originally published by CXO REvolutionaries.Written by Ben Corll, CISO in Residence, Zscaler.As a CISO in Residence, one of my favorite activities is presenting on various topics at regional security summits. It lets me share ideas that I am truly passionate about with new and interesting peop...
Navigating the Shadows: Safeguarding AI Infrastructure Amidst CVE-2023-48022
Blog Published: 08/07/2024
Originally published by Truyo.We all want to leverage AI, but models are only as good as the data used to train them. Often, training data is comprised of confidential information. How do you balance the need to make an AI run effectively without exposing PII? It’s not only the initial trainin...