Cloud 101CircleEventsBlog

All Articles

All Articles
Pro-Active Approaches to Prepare Your Board of Directors for New SEC Cyber Security Rules

Blog Published: 03/21/2024

Originally published by RegScale. In March 2022, the Security and Exchange Commission (SEC) issued a proposed rule titled Cybersecurity Risk Management, Strategy, Governance, and Incident Disclosure. In it, the SEC describes its intention to require public companies to disclose whether their boar...

CISOs, Sewers, and Unsolvable Problems

Blog Published: 03/21/2024

Originally published by CXO REvolutionaries.Written by Daniel Ballmer, Senior Transformation Analyst, Zscaler.CISOs and sewer engineers face similar challenges, and it goes beyond keeping the contents of their systems moving fast and smooth. There is a mathematical exercise that has many names, b...

Cloud Security: The Fundamental Role of Identities

Blog Published: 03/20/2024

Originally published by Tenable. Written by Christopher Edson, Senior Cloud Solutions Architect, Tenable. In the ever-expanding realm of the cloud, one thing is certain: vulnerabilities and misconfigurations are lurking just around the corner, waiting for attackers to exploit them and expose se...

Threat Detection on a Cloud-Native Attack Surface

Blog Published: 03/20/2024

Originally published by Sysdig.Written by Anna Belak. Public cloud infrastructure is, by now, the default approach to both spinning up a new venture from scratch and rapidly scaling your business. From a security perspective, this is a brand new (well, by now more than a decade old) attack surfac...

Quarterly Threat Bulletin Q4 2023: Current Cybersecurity Trends

Blog Published: 03/20/2024

Originally published by Uptycs.Uptycs’ Threat Research Team has released its final Quarterly Threat Bulletin for 2023, detailing cybersecurity trends and the cybersecurity threat landscape: the tactics, techniques, and procedures (TTPs) of the most active malware and prominent threat actor groups...

Zero Trust: Win Friends, Influence People, and Improve Your Organizational Maturity

Blog Published: 03/19/2024

Written by the CSA Zero Trust Working Group Co-Chairs: Jason Garbis, Jerry Chapman, and Christopher Steffen. In our roles as co-chairs, we spend a lot of time and energy talking with enterprises and promoting the idea that Zero Trust needs to be more than just a security initiative – it has to de...

Email Security Best Practices for 2024 (and Beyond)

Blog Published: 03/19/2024

Originally published by Abnormal Security. Written by Mike Britton. As we usher in a new year, the ever-evolving nature of cyber threats requires a proactive and informed approach. The past year in the security space was focused almost entirely on AI and its effects, with advances having a two-pr...

AI Safety vs. AI Security: Navigating the Commonality and Differences

Blog Published: 03/19/2024

Written by Ken Huang, Co-Chair of Two CSA AI Safety Working Groups, VP of Research of CSA GCR, and CEO of Distributedapps.ai. 1: Introduction AI safety and security are fundamental aspects that play distinct yet interconnected roles in the development and deployment of AI systems. AI security...

How Pentesting Fits into AI’s ‘Secure By Design’ Inflection Point

Blog Published: 03/18/2024

Originally published by Synack. Written by James Duggan, Solutions Architect, U.K. and Ireland, Synack. The gamechanging potential of generative AI technology has caught the eye of attackers and defenders in the cybersecurity arena. While it’s unclear how the threat landscape will evolve with the...

2024 State of Cloud Security Report Shows That More Risk Prioritization is Needed

Blog Published: 03/18/2024

Originally published by Orca Security. Written by Shir Shadon and Deborah Galea. Orca Security has released the 2024 State of Cloud Security Report, which leverages unique insights into cloud risks captured by the Orca Cloud Security Platform. Based on risks found in actual production environ...

National Cybersecurity Authority Drives Saudi Arabia's Essential Controls Framework (ECC)

Blog Published: 03/18/2024

Written by AuditCue.The Kingdom of Saudi Arabia's Essential Cybersecurity Controls (ECC), established by the National Cybersecurity Authority (NCA), is a significant leap towards enhancing the nation's cyber defense mechanisms. This set of regulations spans across five critical domains, emphasizi...

Innovating Without Stagnating: Strategies for Security Remediation in 2024

Blog Published: 03/15/2024

Originally published by Dazz. Written by Jordan McMahon, Corporate Marketing, Dazz.In the fast-paced world of cybersecurity, staying ahead of threats while driving innovation is a delicate balance that requires teamwork and clarity. But as the recent CSA State of Security Remediation report noted...

Avoid IAM Drifts Using Explicit-Deny

Blog Published: 03/15/2024

Written by Israel Chorzevsk. Background Over the last decade, cloud providers advanced their authorization mechanism, and added more and more ways to grant access to resources. Having multiple ways to grant access may lead to authorization drifts. This post describes several authorization featur...

Defend Against Azure Cross-Tenant Synchronization Attacks

Blog Published: 03/15/2024

Originally published by CrowdStrike. Azure cross-tenant synchronization (CTS) was made generally available on May 30, 2023, and introduced a new attack surface on Microsoft Entra ID (formerly Azure Active Directory) where attackers can move laterally to a partner tenant or create a backdoor on an...

2023 Threat Intelligence Year in Review: Key Insights and Developments

Blog Published: 03/14/2024

Originally published by Microsoft Security.It has been an incredible year for Microsoft Threat Intelligence. The sheer volume of threats and attacks revealed through the more than 65 trillion signals we monitor daily has given us many inflection points, especially as we notice a shift in how thre...

A Comprehensive Guide to Business Cyber Security

Blog Published: 03/14/2024

Originally published by CAS Assurance. In the digital age, online security is among the most critical factors for any business. As more and more people are living their lives online, security has become a priority for those giving up sensitive information – including financial data – via the Worl...

Understanding and Preventing Business Email Compromise

Blog Published: 03/14/2024

Originally published by CXO REvolutionaries.Written by Gary Parker, CTO in Residence, Zscaler.Businesses of all sizes face a growing cybersecurity and financial threat known as business email compromise (BEC) simply because they use email. BEC attacks have become increasingly sophisticated, posin...

Lessons Learned from HIPAA Compliance Breaches

Blog Published: 03/13/2024

Originally published by BARR Advisory.Written by Claire McKenna. According to the Department of Health and Human Services (HHS) Office for Civil Rights (OCR), there has been a considerable upward trend in healthcare data breaches since the office began tracking data breach statistics in 2009. You...

Taking Back Control: The Growing Appeal of On-Premise and Hybrid Solutions

Blog Published: 03/13/2024

Written by Ascertia. The digital age demands robust security and unwavering trust. While cloud-based solutions have dominated recent years, organisations across the globe are increasingly turning to on-premise and hybrid-based digital trust solutions. This blog explores the factors driving thi...

Cybersecurity Regulations and the Impact on Consumers

Blog Published: 03/13/2024

Originally published by RegScale.The theme for this year’s Cybersecurity Awareness Month, “Secure Our World,” underscores the importance of cybersecurity in our daily lives. This theme serves as a reminder that despite the convenience and connectivity of the digital age, there are inherent risks ...

Looking for the CCM?

Start using the Cloud Controls Matrix to simplify compliance with multiple standards & regulations.