Cloud 101CircleEventsBlog
Help shape the future of cloud security! Take our quick survey on SaaS Security and AI.

All Articles

All Articles
Cybersecurity: Where Do Canadian Companies Stand?

Blog Published: 08/09/2023

Written by NOVIPRO. The widespread adoption of remote work has disrupted Canadian companies’ cybersecurity practices. However, according to the latest IT Landscape in Canadian Small, Medium, and Large Enterprises 2023 report, few companies appear ready to invest more in protecting their and th...

How to Overcome the Challenges of Legacy Identity Migration

Blog Published: 08/09/2023

Written by Eric Olden, CEO of Strata Identity. Originally published on Forbes. Identity has always been the cornerstone for controlling access to the apps and data employees and customers need. And with the advent of cloud computing, managing identity now requires organizations to reconcile their...

Behind The Breach: Self-Service Password Reset (SSPR) Abuse in Azure AD

Blog Published: 08/09/2023

Originally published by Obsidian Security.In several recent investigations of SaaS security incidents, the Obsidian threat research team identified a novel attack vector in the wild: abuse of the Azure AD self-service password reset (SSPR) feature.With the glaring lack of coverage around this spe...

Who’s Who in Cloud Security? CSPM, CIEM, CWPP & CNAPP Explained

Blog Published: 08/08/2023

Originally published by Sysdig. Written by Alba Ferri. Cloud Native Application Protection Platforms – or CNAPP solutions – are steadily gaining traction as the best solutions to address Cloud Native security.Regardless of your cloud adoption maturity (whether you’re PoC-ing some services in the ...

Secrets of Securing Intellectual Property (IP) in the Cloud

Blog Published: 08/08/2023

Written by Satish Govindappa. In this article, we will explore the risks, challenges, and strategies for effectively securing intellectual property (IP) in the cloud, as it’s related to the modern chip design industry. I will also share 7 pillars (the Secret Recipe) for successfully protecting IP...

Startups Don’t Need Cyber Security (Or Do They?)

Blog Published: 08/07/2023

Originally published by NCC Group. Written by Sourya Biswas, Technical Director, NCC Group. Every new day seems to reveal news of yet another data breach or ransomware attack. CNET published a great article towards the end of 2019 cataloging the major data breaches last year. While I won’t name a...

How Do You Protect Your Data in the Age of Hybrid Work?

Blog Published: 08/07/2023

Written by Sundaram Lakshmanan, Chief Technology Officer, Lookout. We live in an age where hybrid work and bring-your-own-device (BYOD) programs have become the norm. The result is that you’re tasked with protecting your data in an environment that’s far more complex than in the past. With more...

PCI Compliance Explained - Secure Your Credit Card Information Successfully

Blog Published: 08/04/2023

Originally published by BARR Advisory. Written by Kyle Cohlmia. According to the 2023 Verizon Data Breach Investigations Report (DBIR), financial motive was the motivation for 95% of the past year’s data breaches. In today’s business world, it only takes the tap of a card or click of a button to ...

Dissecting Cloud Ransomware: Lessons Learned and How to be Prepared

Blog Published: 08/04/2023

Originally published by Dig Security. Written by Sharon Farber. Our most recent webinar, “Dissecting Cloud Ransomware: Lessons learned and how to be prepared?” saw Yotam Ben Ezra (Chief Product Officer) and Ofir Balassiano (Head of Security Research) engaging in an in-depth exploration of all asp...

PoC Exploit: Fake Proof of Concept with Backdoor Malware

Blog Published: 08/04/2023

Originally published by Uptycs. Threat Researchers: Nischay Hegde and Siddartha Malladi. A deceptive twist has appeared within cybersecurity norms—a proof of concept (PoC) that, rather than demonstrating a vulnerability, stealthily harbors a hidden backdoor. Recently discovered by the Uptycs thre...

In the Age of Innovation, Does Security Hold the Key?

Blog Published: 08/03/2023

CSA recently conducted a survey delving into the intersection of security and innovation. Our mission with this study was to untangle the intricate relationship between security and innovation, shedding light on how security is perceived within the organizational framework, its role in driving in...

Cloud Security Alliance Research Reveals Relationship Between Security and Innovation

Press Release Published: 08/03/2023

Research sponsored by Expel provides surprising insights into shifting cloud security strategies and trendsHerndon, Va., August 3, 2023 – Expel, the security operations provider that aims to make security easy to understand, use and improve, today unveiled a new report, “Security-Enabled Innovati...

Meeting and Scaling Compliance with Intentional IaC Design

Blog Published: 08/03/2023

Originally published by Coalfire. Written by Christian Stano, Senior Consultant, Cloud Services, Coalfire.Key takeaways Utilizing consolidated, “smart” compliance-aware Terraform module design decreases audit risk and cost and maintains or accelerates developer velocity by shifting the burden of ...

API Security: The Fabric of the Future

Blog Published: 08/03/2023

Originally published by CXO REvolutionaries. Written by Sam Curry, VP & CISO, Zscaler. We cannot solve our problems with the same thinking we used when we created them." - Albert EinsteinThe digital landscape is transforming at a breakneck pace. The next frontier? API security. In our interco...

How Zero Trust Can Enable Digital Trust

Blog Published: 08/02/2023

Originally published by DigiCert. Written by Jason Sabin. Digital trust and zero trust are both common cybersecurity phrases, but what do they mean and what is the difference between them?In our connected world where everything is online, traditional boundaries no longer apply and neither do trad...

Mitigating Risks and Optimizing Benefits in Vendor Consolidation

Blog Published: 08/02/2023

Written by G Kiran Raju, Microsoft Ecosystem, Business Development & Product Offerings, Cybersecurity & GRC Services, HCLTech and David Branscome, Global Partner Solutions Architect – Security, Microsoft. With an accelerating pace of technological innovation, organizations face a double-e...

The Essential Capabilities of a DSPM Solution

Blog Published: 08/01/2023

Originally published by Laminar. Written by Lisa Bilawski, Director of Content Marketing, Laminar. There’s been a worldwide shift from on-premises to cloud storage and a boom in data democratization (making data accessible and usable across the entire organization). These two shifts have resulted...

Stopping Phishing Attacks and Socially-Engineered Threats from ChatGPT

Blog Published: 08/01/2023

Originally published by Abnormal Security. Written by Jade Hill. What’s the difference between a tool and a weapon? It’s all about intent. What someone uses for creative purposes can also be used for malicious purposes.Consider generative AI, which includes popular technologies like ChatGPT and G...

Are There Security Risks in Mergers and Acquisitions?

Blog Published: 07/31/2023

Originally published by Schellman. When making a business acquisition, the potential of a security risk derailing a deal during an acquisition is quite low. Of course, when firms look to expand the number and types of services they deliver, the first consideration doesn’t usually regard security—...

Compromised Accounts Are Being Weaponized – Here’s How to Fight Back

Blog Published: 07/31/2023

Originally published by Code42. Written by Christian Wimpelmann. Compromised user accounts have always been the most significant — and simplest — cybersecurity risk in the enterprise. Stolen credentials were the vector of choice for more than 40% of attacks in 2022, according to Verizon’s 2022 Da...

Looking for the CCM?

Start using the Cloud Controls Matrix to simplify compliance with multiple standards & regulations.