Cloud 101CircleEventsBlog

All Articles

All Articles
Evaluating Cloud Email Security Solutions

Blog Published: 07/18/2023

Originally published by Abnormal Security. Written by Mick Leach. Email is a significant target for attackers, primarily because it’s used by every member of an organization—from employees and executives to vendors and customers. The information exchanged through email can range from casual conve...

Three Ways Cybercriminals Could Use AI to Harm Your Organization

Blog Published: 07/18/2023

Originally published by ThreatLocker. Introduction The introduction of Generative Artificial Intelligence (AI) tools has elevated the way individuals streamline their day-to-day tasks. AI has proven to be a groundbreaking development in human efficiency and the way people create, structure, and b...

Behind the Breach: Phishing & Token Compromise in SaaS Environments

Blog Published: 07/17/2023

Originally published by Obsidian. Earlier this year, Gartner published a new research report focused on the human component of cybersecurity which explored trends around cybersecurity leadership, challenges with hiring, and attacks targeting individuals. One notable prediction—that by 2025, lack ...

Top 4 Myths About Cybersecurity Compliance Assessors: How to Build a Successful Auditor Partnership That Enables Your Business

Blog Published: 07/17/2023

Originally published by Coalfire. Written by Kylene Bowman, Director, Coalfire.Managing change is a challenge in the marketplace and in the information security industry, so it’s no surprise that enterprises are pressured to adjust and innovate their compliance strategy at the same pace. When aud...

AI is Here: How Should CISOs Respond?

Blog Published: 07/17/2023

AI tools are spreading rapidly and CISOs need to be ready.Originally published by F5. Written by Gail Coury, CISO, F5. IntroductionWith artificial intelligence (AI) use growing in the enterprise, Chief Information Security Officers play a critical role in its implementation and adoption. CISOs ne...

Cloud Security Alliance Cybersecurity Trainings Now Available on the GSA Multiple Award Schedule

Blog Published: 07/14/2023

Updated 10/23/24 with the addition of CCZT to CSA's listing.The Cloud Security Alliance has recently been listed on the GSA Multiple Award Schedule. This achievement required the completion of a formal proposal process and acts as CSA’s calling card as a vetted supplier to do business with the fe...

Implementing Least Privilege in AWS: Strategies for Minimizing Security Risks

Blog Published: 07/14/2023

Written by Abhishek Bansal, Founder, Autharva. Problem StatementIn the dynamic and ever-changing digital landscape, organizations find themselves in a perpetual battle against the looming specter of security breaches and unauthorized access to their most sensitive data. These risks have escalate...

FedRAMP Revision 5 Explained

Blog Published: 07/14/2023

Originally published by Schellman. Given its standardized approach to assessing, authorizing, and continuously monitoring cloud services used by federal agencies, the Federal Risk and Authorization Management Program (FedRAMP) has been a critical component of the U.S. government's cloud security ...

Uniting Enterprises for a Safer Future: The Collective Influence of the Cloud Security Alliance

Blog Published: 07/13/2023

As our reliance on digital ecosystems expands exponentially in this era of accelerated digital transformation, so does the need for comprehensive, robust, and adaptive security measures. To mitigate evolving threats, enterprises must not merely stay abreast of the curve but redefine it, perceivin...

Agents vs Agentless: Choosing the Right Security Approach for Your Specialized Cloud Virtual Machine Workloads

Blog Published: 07/13/2023

Originally published by Tenable. Written by John Tonello and Ryan Bragg. You can scan virtual machines for security vulnerabilities in multiple ways depending on what your instances are running, how long they’re up, and whether or not they can run an agent or be accessed with administrative cre...

The Blind Spot of Data Leakage – And What to Do About It

Blog Published: 07/13/2023

Originally published by CXO REvolutionaries. Written by Ben Corll, CISO - Americas, Zscaler. The premise of cybersecurity is defending against digital threats – malware, hackers, criminal organizations, and the rest. This makes plenty of intuitive sense. Attackers primarily come from the outside,...

Managing Data Explosion with Software-Defined Storage (SDS)

Blog Published: 07/12/2023

Originally published by Sangfor. Written by Nicholas Tay Chee Seng, CTO, Sangfor Cloud. A New Era of Massive Data Generation The vast amount of data generated on a daily basis by industries and large organizations worldwide is growing at an outstanding rate. Statista forecasts that the total amo...

Day in the Life: Network Operations Manager

Blog Published: 07/12/2023

Originally published by Netography. Written by Mal Fitzgerald, Sales Engineer, Netography. It’s early. I’m crushing only my second large coffee of the day and the four words I never want to hear are being uttered by folks sitting in front of my office: “The network is slow.”History tells me that ...

Why Businesses Struggle to Meet Compliance Requirements

Blog Published: 07/12/2023

Originally published by BARR Advisory. Written by Christine Falk. We recently sat down with Steve Ryan, manager of Attest Services, to discuss his thoughts on why businesses struggle to meet compliance requirements. Here’s what he had to say:Steve, why do you think it’s difficult for businesses t...

Positioning Your Cybersecurity Program for Success

Blog Published: 07/11/2023

Originally published by CAS Assurance. Increasing pressure for success It is not a secret that many organizations are increasing spending on cybersecurity. A research by Enterprise Strategic Group shows that 65% of organizations planned to increase cybersecurity spending in 2023. The research fu...

TechStrong PulseMeter Report: 47% of Organizations Have Limited Awareness of Their Sensitive Data in the Cloud

Blog Published: 07/11/2023

Originally published by Orca Security. Written by Jason Silberman. Organizations are continuing full speed ahead in moving much of their sensitive data to the cloud. Cybersecurity Ventures predicted in 2020 that the total amount of data stored in the cloud will reach 100 zettabytes by 2025, o...

Balancing Trust and Security for Business Resilience

Blog Published: 07/11/2023

How global organizations can mitigate insider threats in a hybrid work environment Written by Syam Thommandru, Vice President and Global Head – Strategic Alliances, Product Management, Business Partnerships, Cybersecurity & GRC Services, HCLTech and Anirudh Rautela, Director, Head of Cyber Se...

What Automation Means For Cybersecurity—And Your Business

Blog Published: 07/10/2023

Originally published by Varonis. Written by Yaki Faitelson. In the movie Apollo 13, three astronauts returning to Earth are unaware of their perilous reentry. Back in Houston at Mission Control, chief flight director Gene Kranz (played by Ed Harris) comments on the unfortunate events, saying: "Is...

Can You Have Too Much Security? How to Be in the "Goldilocks" Zone

Blog Published: 07/10/2023

Originally published by NCC Group. Written by Sourya Biswas, Technical Director, NCC Group. As cyber security consultants, we typically help clients determine where their cyber security gaps lie and how to bridge them. This can include detecting issues with respect to best practices and recommend...

White House Cyber Strategy: Leadership is Now Accountable

Blog Published: 07/10/2023

Originally published by Coalfire. Written by Jose Vasquez, Security Solutions Architect, Coalfire. The National Cybersecurity Strategy represents one of the most significant market-driving forces in the history of IT. It ushers in a new era of standards, requirements, and best practices that will...

Looking for the CCM?

Start using the Cloud Controls Matrix to simplify compliance with multiple standards & regulations.