Cloud 101CircleEventsBlog
Help shape the future of cloud security! Take our quick survey on SaaS Security and AI.

All Articles

All Articles
Generative AI: Proposed Shared Responsibility Model

Blog Published: 07/28/2023

Overview Large Language Models (LLMs) have gained attention due to the recent burst in popularity of ChatGPT, a consumer-centric chatbot released by OpenAI which uses Generative AI capabilities. The impact of ChatGPT on companies and enterprises has been huge, as has been the impact of the open ...

Cloud Vulnerability Management Program

Blog Published: 07/28/2023

Written by Kazi Arif, Senior Consultant, AT&T Cybersecurity. Continuous technological advancements introduce critical vulnerabilities to your organization that malicious actors seek to exploit. Despite considerable time, money, and resources invested into security, achieving 100% protection i...

Will You Remain Relevant in AI's World?

Blog Published: 07/28/2023

Originally published by CXO REvolutionaries. Written by Daniel Ballmer, Senior Transformation Analyst, Zscaler. The recent advancement of AI platforms such as ChatGPT, Dall-E, Midjourney, and MS CoPilot have thrown an already fast-moving industry into overdrive. Today’s tech workers have endured ...

Last Mile Enforcement: Securing Those Unmanageable Non-Standards-Based Applications

Blog Published: 07/27/2023

Originally published by Strata.Is it possible to have modern authentication for both standards-based and non-standards-based apps? In today’s rapidly-evolving business environment, enterprise applications are crucial for driving innovation and productivity. From an identity standpoint, they are b...

Living-off-the-Land Attack: PowerDrop

Blog Published: 07/27/2023

Originally published by ThreatLocker.On June 6, 2023, Adlumin Threat Research discovered a living-off-the-land attack, PowerDrop, using a malicious PowerShell script to target the US aerospace industry. LOTL attacks leverage powerful built-in tools to masquerade as legitimate processes. Therefo...

Four Ways to Quickly Determine Your Atomization Issue and Next Steps to Fix it

Blog Published: 07/27/2023

Originally published by Netography. Written by Martin Roesch, CEO, Netography. Network atomization didn’t happen overnight. It’s been a progression over the last fifteen-plus years driven by digital transformation, a rise in multi-cloud strategies, and the shift to a hybrid workforce. And now, we...

Building a Data Management Plan

Blog Published: 07/26/2023

Originally published by BARR Advisory. Written by Christine Falk. Building and operating a data management plan can be time consuming and overwhelming. You don’t have to go it alone. BARR Advisory asked Dariek Howard, manager, Attest Services, to share his thoughts and recommendations for buildin...

Multi-Cloud vs. Hybrid Cloud: Choosing the Right Cloud

Blog Published: 07/26/2023

Originally published by Sangfor. Written by Nicholas Tay Chee Seng, CTO, Sangfor Cloud. Today’s digitally dominated economy has transformed the global landscape. Efficient and cost-effective IT infrastructure, namely cloud computing, is critical to providing organizations with the competitive edg...

Authenticating the Authenticators: A Zero Trust Thought Experiment

Blog Published: 07/26/2023

Quis custodiet ipsos custodes?This first-century Latin phrase translates as “Who watches the watchmen?”, and has made its way through classical philosophy and into popular culture. (Fellow Watchmen fans, I’m thinking of you). Fast-forwarding 2,000 years into our familiar domain of information sec...

What is a Card-On-File Transaction?

Blog Published: 07/26/2023

Originally published by TokenEx. Written by Valerie Hare. In today’s digital age, more businesses are offering contactless payment methods for customers, such as card-not-present (CNP) transactions. CNP transactions grew 23 percent in 2021 and will continue to gain speed due to the convenience of...

Around the Horn with a Cybersecurity Summer

Blog Published: 07/25/2023

Like many of you I presume, summer is my favorite time of the year. Where I live, the weather is perfect and life seems to be an endless parade of beaches, cookouts, and baseball. The challenge is to stay focused on work. For this update, I decided to cheat a bit, leverage some baseball nomenclat...

Microsoft Executive Shawn Bice to Discuss the Intersection of AI, Cloud, and Cybersecurity at Cloud Security Alliance’s SECtember 2023

Press Release Published: 07/25/2023

Industry veteran will hold a keynote fireside chat on the widespread integration of Generative AI within cloud security solutions and what the future may bringSEATTLE – July 25, 2023 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certificati...

Maximizing ROI on Cybersecurity Training

Blog Published: 07/25/2023

Originally published by Coalfire. With many organizations facing understaffed IT and security departments with limited time and budget, it's smart to ask, "How do the benefits of security awareness training outweigh the costs?"Key Takeaways:Traditional training for compliance is ineffective for p...

Navigating Cloud Security Challenges: Key Concerns for Cybersecurity Professionals

Blog Published: 07/25/2023

Written by Scott Caveza, Tenable. As organizations expand their use of public cloud and adopt a cloud-first strategy, cybersecurity teams encounter mounting complexity and new forms of risk. Cloud service providers (CSPs) often apply patches silently and fix misconfigurations without any notice. ...

Protecting PII in the Cloud

Blog Published: 07/25/2023

Written by Ashwin Chaudhary, CEO, Accedere. Cloud computing has revolutionized the way businesses operate, providing flexibility, scalability, and cost savings. PII (Personal Identifiable Information) refers to any data that can be used to identify a specific individual. PII is often sensitive...

Highlights from the 2023 Cloud Threat Report

Blog Published: 07/24/2023

Originally published by Aqua Security. Written by Chris Simmons, Senior Director Product Marketing, Aqua Security. The adoption of cloud native technologies has become a cornerstone to helping business build and run applications. Cloud computing has revolutionized the way organizations design, de...

Hospitals and Ransomware: The Human Cost of Weak Cybersecurity

Blog Published: 07/24/2023

Originally published by NCC Group.Written by Sourya Biswas, Technical Director, NCC Group.While data breaches have been the most prominent consequence of cyber attacks in the last decade, ransomware attacks have been fast catching up. And if you’ve been following the news around ransomware, you w...

Data Security Posture Management (DSPM): Best Practices Guide for CISOs

Blog Published: 07/24/2023

Originally published by Varonis. Written by Rob Sobers. Protecting your company's data is increasingly difficult, as more and more data is created across your organization. You're doing everything you can to prevent breaches, or if you're less fortunate, you've had a data breach and need t...

CSA’s Enterprise Architecture: Security and Risk Management (SRM)

Blog Published: 07/22/2023

Written by CSA’s Enterprise Architecture Working Group. The Enterprise Architecture is both a methodology and a set of tools that enable security architects, enterprise architects, and risk management professionals to leverage a common set of solutions and controls. It can be used to assess oppor...

The Commercial Integration of Quantum Technology

Blog Published: 07/21/2023

Implications of Quantum’s Mass AdoptionWritten by Cory Missimore of the CSA Quantum-Safe Security Working Group. Reviewed by Mehak Kalsi and Bruno Huttner. The adoption of new technologies is critical in meeting new business needs. As seen in the COVID-19 pandemic in 2020, companies had to quickl...

Looking for the CCM?

Start using the Cloud Controls Matrix to simplify compliance with multiple standards & regulations.