7 Most Commonly Asked PCI Compliance Questions
Blog Published: 09/09/2024
Originally published by CyberGuard Compliance.Ignorance is not an excuse for failing a PCI DSS audit or, worse yet, being victimized by a data breach. The Payment Card Industry Data Security Standard (PCI DSS) clearly defines responsibilities and guidelines for protecting sensitive information...
Responding to Cyberattacks—Creating a Successful Contingency Plan
Blog Published: 09/09/2024
Originally published by BARR Advisory.In today’s digital age, all organizations are exposed to some level of risk. As a baseline, companies are expected to have appropriate controls and safeguards in place to protect their customer’s information—but even the most well-postured organizations ma...
An IT Veteran’s Guiding Principles for Successfully Implementing Zero Trust
Blog Published: 09/09/2024
Originally published by CXO REvolutionaries.Written by Guido Sacchi, Former Senior Executive Vice President and Chief Information Officer, Global Payments.Over the course of my career as a consultant, executive, and advisor, I have spent a good deal of time reflecting on my personal imperative...
A Step-by-Step Guide to Improving Large Language Model Security
Blog Published: 09/10/2024
Originally published by Normalyze.Written by Ravi Ithal.Over the past year, the buzz around large language models (LLMs) has skyrocketed, prompting many of our customers to ask: How should we think about securing AI? What are the security implications? To answer these questions, it’s good to a...
As Non-Human Identity Attacks Soar, Cloud Security Alliance and Astrix Security Reveal Critical Gaps in Non-Human Identity Protection
Press Release Published: 09/12/2024
New data shows that one in five organizations have experienced a security incident related to non-human identities; and only 15% remain confident in their ability to secure themSeattle - September 12, 2024 - The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defin...
7 Essential SaaS Security Best Practices
Blog Published: 09/12/2024
Originally published by Suridata.No More SaaS Security TradeoffsIf your organization is like most, you are probably using upwards of a hundred Software-as-a-Service (SaaS) applications. The reasons for this are many, including convenience, instant access to enterprise software, and flexibility...
What are OAuth Tokens, and Why are They Important to Secure?
Blog Published: 09/12/2024
Originally published by Astrix.What are OAuth Tokens? OAuth (Open Authorization) Tokens are Non-Human Identities that work as a secure authentication mechanism. They delegate access to third parties or external apps without exposing your environment’s sensitive credentials. Organizations that ...
Never Trust User Inputs—And AI Isn't an Exception: A Security-First Approach
Blog Published: 09/13/2024
Originally published by Tenable. Written by Rémy Marot. Artificial Intelligence (AI) is transforming industries and beginning to be widely adopted by software developers to build business applications. However, it’s critical that organizations ensure the security of their users, their data a...
Cybercriminals Exploit Docusign with Customizable Phishing Templates
Blog Published: 09/17/2024
Originally published by Abnormal Security.Written by Daniel Kelley.Over the past month, we've noticed a surge in Docusign phishing emails targeting our customers. To further investigate this issue, we took one of the recent attacks stopped by Abnormal and searched for it on cybercrime forums a...
What You Need to Know About Cyber Extortion
Blog Published: 09/18/2024
Originally published by Veeam Software.Written by Javier Perez, Sr. Director of Product Marketing for Security at Veeam Software.Cyber extortion is no longer just a headline —it's a daily challenge for organizations. Protecting your organization requires more than just defenses; it’s about bei...
FedRAMP Moderate Equivalency for Cloud Service Providers Explained
Blog Published: 09/19/2024
Originally published by Schellman.Looking back, December 2023 was a big month for the Department of Defense (DoD). Not only did they release the 32 CFR Part 170 - Cybersecurity Maturity Model Certification (CMMC) Proposed Rule, but they also published a memorandum titled Federal Risk and Autho...
Building a Comprehensive Trust Center
Blog Published: 09/20/2024
Originally published by Vanta.In today's digital landscape, trust is paramount. Customers want to know that their data is secure and that they can rely on the companies they do business with. One of the best ways to provide this assurance is through a well-crafted, up-to-date Trust Center. Bu...
The Metadata Minefield: Protecting All Your Sensitive Data
Blog Published: 09/20/2024
Originally published by Symmetry Systems.Written by Claude Mandy, Chief Evangelist for Data Security, Symmetry Systems.When determining the sensitivity of data, it’s easy to focus solely on the content itself. However, the metadata associated with data can potentially expose other just as sens...
Building a Resilient Manufacturing Environment Through Zero Trust OT Cybersecurity Controls
Blog Published: 09/23/2024
Originally published by CXO REvolutionaries.Written by Suvabrata Sinha, CISO in Residence, Zscaler.IntroductionIn the past five years, multiple crises and disruptions have introduced a new word to the lexicon: “resilient manufacturing.” This is an approach not pivoted on cost, productivity, or...
Top Threat #2 - Identity Crisis: Staying Ahead of IAM Risks
Blog Published: 09/16/2024
Written by CSA’s Top Threats Working Group.In this blog series, we cover the key security challenges from CSA's Top Threats to Cloud Computing 2024. Drawing from insights of over 500 experts, we'll discuss the 11 top cybersecurity threats, their business impact, and how to tackle them. Whether...
Lean and Mean: Cutting Cybersecurity Costs Without Cutting Corners
Blog Published: 09/16/2024
Originally published by CXO REvolutionaries.Written by Rob Sloan, VP, Cybersecurity Advocacy, Zscaler.Deciding on the appropriate amount of funding for information security in the upcoming year is a tricky task. Despite gross domestic product rising, low unemployment, and falling inflation, th...
The Cybersecurity Scene Over the Last 3 Years: Ways Businesses Are Changing and Succeeding
Blog Published: 09/17/2024
Written by Abel E. Molina, Principal Architect in Design Studio, Softchoice.IntroductionConsider the following challenge: You are presented by your leaders to tear down and remodel a cruise ship, while keeping the overall structure intact. Where do you begin? Which team/partners would you invo...
Fundamentals of Cloud Security Stress Testing
Blog Published: 09/18/2024
Originally published by Pentera.“Defenders think in lists, attackers think in graphs” said John Lambert from Microsoft, distilling the fundamental difference in mindset between those who defend IT systems and those who try to compromise them.The traditional approach for defenders is to list se...
Current Challenges with Managing Permissions and API Keys
Blog Published: 09/18/2024
Recent CSA survey data shows that organizations are struggling to manage permissions and API keys. (API keys are the codes used to authenticate users and applications.) Keep in mind that API keys are also a type of non-human identity (NHI). An NHI is a digital construct used for machine-to-mac...
Leveraging Zero-Knowledge Proofs in Machine Learning and LLMs: Enhancing Privacy and Security
Blog Published: 09/20/2024
Written by Ken Huang, CEO of DistributedApps.ai and VP of Research at CSA GCR.I recently attended Cloud Security Alliance's AI Controls Working Group's face-to-face meetings in Seattle. One interesting question was asked by one of our participants on if zero-knowledge proofs (ZKPs) are used in...