Cloud 101CircleEventsBlog
Help shape the future of cloud security! Take our quick survey on SaaS Security and AI.

All Articles

All Articles
Day in the Life: Network Operations Manager

Blog Published: 07/12/2023

Originally published by Netography. Written by Mal Fitzgerald, Sales Engineer, Netography. It’s early. I’m crushing only my second large coffee of the day and the four words I never want to hear are being uttered by folks sitting in front of my office: “The network is slow.”History tells me that ...

Why Businesses Struggle to Meet Compliance Requirements

Blog Published: 07/12/2023

Originally published by BARR Advisory. Written by Christine Falk. We recently sat down with Steve Ryan, manager of Attest Services, to discuss his thoughts on why businesses struggle to meet compliance requirements. Here’s what he had to say:Steve, why do you think it’s difficult for businesses t...

Positioning Your Cybersecurity Program for Success

Blog Published: 07/11/2023

Originally published by CAS Assurance. Increasing pressure for success It is not a secret that many organizations are increasing spending on cybersecurity. A research by Enterprise Strategic Group shows that 65% of organizations planned to increase cybersecurity spending in 2023. The research fu...

TechStrong PulseMeter Report: 47% of Organizations Have Limited Awareness of Their Sensitive Data in the Cloud

Blog Published: 07/11/2023

Originally published by Orca Security. Written by Jason Silberman. Organizations are continuing full speed ahead in moving much of their sensitive data to the cloud. Cybersecurity Ventures predicted in 2020 that the total amount of data stored in the cloud will reach 100 zettabytes by 2025, o...

Balancing Trust and Security for Business Resilience

Blog Published: 07/11/2023

How global organizations can mitigate insider threats in a hybrid work environment Written by Syam Thommandru, Vice President and Global Head – Strategic Alliances, Product Management, Business Partnerships, Cybersecurity & GRC Services, HCLTech and Anirudh Rautela, Director, Head of Cyber Se...

What Automation Means For Cybersecurity—And Your Business

Blog Published: 07/10/2023

Originally published by Varonis. Written by Yaki Faitelson. In the movie Apollo 13, three astronauts returning to Earth are unaware of their perilous reentry. Back in Houston at Mission Control, chief flight director Gene Kranz (played by Ed Harris) comments on the unfortunate events, saying: "Is...

Can You Have Too Much Security? How to Be in the "Goldilocks" Zone

Blog Published: 07/10/2023

Originally published by NCC Group. Written by Sourya Biswas, Technical Director, NCC Group. As cyber security consultants, we typically help clients determine where their cyber security gaps lie and how to bridge them. This can include detecting issues with respect to best practices and recommend...

White House Cyber Strategy: Leadership is Now Accountable

Blog Published: 07/10/2023

Originally published by Coalfire. Written by Jose Vasquez, Security Solutions Architect, Coalfire. The National Cybersecurity Strategy represents one of the most significant market-driving forces in the history of IT. It ushers in a new era of standards, requirements, and best practices that will...

Security Guidance from the Front Lines of Cloud Incident Response

Blog Published: 07/07/2023

Originally published by CrowdStrike on June 15, 2023. In our first-ever Cloud Threat Summit, CrowdStrike’s Senior Vice President of Intelligence and Senior Director of Consulting Services discussed the most common ways adversaries breach the cloud and the steps organizations can take to stay safe...

The LastPass Breach is a Wake Up Call for Cloud Data Security

Blog Published: 07/07/2023

Originally published by Dig Security. Written by Ofir Shaty and Ofir Balassiano. For many LastPass employees – from software engineers to C-level executives – the last few months have been hell. Since December, the company has been embroiled in what’s shaping up to be a major data security scanda...

White House National Cybersecurity Strategy – Key Takeaways

Blog Published: 07/07/2023

Originally published by DigiCert. Written by Mike Nelson. Earlier this month, the White House released their National Cybersecurity Strategy, demonstrating a heightened focus in the highest levels of government on securing our digital interactions, which, as we’ve seen with recent attacks on crit...

I’ve Just Bought Zero Trust, Now What?

Blog Published: 07/06/2023

Originally published by CXO REvolutionaries. Written by Brett James, Director, Transformation Strategy, Zscaler. What does “buying zero trust” even mean? You’ve bought into the modern security concepts that governments and industry bodies have been promoting? You’ve received funding and resources...

Proxyjacking Has Entered the Chat

Blog Published: 07/06/2023

Originally published by Sysdig. Written by Crystal Morin. Did you know that you can effortlessly make a small passive income by simply letting an application run on your home computers and mobile phones? It lets others (who pay a fee to a proxy service provider) borrow your Internet Protocol (IP)...

What Does it Mean to Be a Modern App?

Blog Published: 07/06/2023

Originally published by Strata.Written by Ben Robertson, Principal Solutions Architect, Strata Identity.There’s a common thought that if an application speaks industry-leading identity standards, it automatically makes it modern. However, the requirements of apps today go beyond that. How the pro...

Cloud Security: What It Is and How to Implement It to Secure Data, Applications, and Infrastructure

Blog Published: 07/05/2023

Written by Genesio Di Sabatino, Head of Cloud Security, Swascan. The increasing migration of data, applications and infrastructure to new technological environments poses cybersecurity challenges in completely unexplored contexts where cloud security plays a leading role. Here's everything you ne...

State of Cloud Data Security Report Reveals Increase in Cloud Data Breaches: Shadow Data Concerns

Blog Published: 07/05/2023

Originally published by Laminar. Written by Andy Smith, Chief Marketing Officer, Laminar. Cloud transformation and data democratization provide a number of benefits to organizations, but these same technologies and trends are also introducing the greatest risks.We are in the midst of cloud data’s...

Third-Party App Integration Permissions: What You Need to Know

Blog Published: 07/05/2023

Originally published by Abnormal Security. Written by Ryan Schwartz. On average, enterprise organizations have roughly 300 third-party applications integrated into their cloud environment, according to our Knowledge Base data. It isn’t surprising either as there are apps for every imaginable busi...

Insider Threats to the Healthcare Industry

Blog Published: 06/30/2023

Originally published by Coalfire. Written by Ian Walters, Principal, Thought Leader, Coalfire. A discussion of insider threats faced by the U.S. healthcare industry highlighting the types of threats and recommendations on how organizations can mitigate the risks. Key takeaways:Identifying example...

Balancing Security, Innovation, and Who's Liable for Security Flaws

Blog Published: 06/30/2023

Originally published by Dazz. Written by Julie O’Brien, CMO, Dazz. The recent Wall Street Journal article, “Should Software Companies Be Held Liable for Security Flaws?” shared differing points of view from the former U.S. National Cyber Director and the vice president of the Information Te...

Mastering Kubernetes Security: Navigating Complexity and Securing Your Cloud Native Architecture

Blog Published: 06/29/2023

Originally published by Tenable. Written by Shantanu Gattani. Demystifying Kubernetes security is paramount for cloud security teams in today's landscape. As organizations increasingly adopt Kubernetes for their container deployments, understanding Kubernetes’ unique security challenges and imp...

Looking for the CCM?

Start using the Cloud Controls Matrix to simplify compliance with multiple standards & regulations.