Cloud 101CircleEventsBlog
Help shape the future of cloud security! Take our quick survey on SaaS Security and AI.

All Articles

All Articles
Building a Better DSPM by Combining Data Classification Techniques

Blog Published: 02/08/2023

Originally published by Sentra. The increasing prevalence of data breaches is driving many organizations to add another tool to their ever growing security arsenal - data security posture management, or DSPM. This new approach recognizes that not all data is equal - breaches to some data can h...

Maximizing the Benefits of Your SOC 2 Audit

Blog Published: 02/08/2023

Originally published by CAS Assurance. What is the purpose of SOC 2 audit? System and Organization Controls (SOC 2) audit focuses on the controls at a Service Organization relevant to the Security, Availability, Processing Integrity, Confidentiality, and Privacy of both the system and information...

Ensuring SaaS Security in ISO Compliance

Blog Published: 02/07/2023

Originally published by Adaptive Shield. The International Organization for Standardization (ISO) sets standards across various industries. As an internationally recognized standards organization, its two information technology security standards - ISO 27000:2018 and ISO 27001:2013 - can be used ...

Data Privacy Week - A Commitment for the Entire Year

Blog Published: 02/07/2023

Originally published by Skyhigh Security on January 23, 2023. Written by Rodman Ramezanian, Global Cloud Threat Lead, Skyhigh Security. Nowadays, when you download a new app, open a new online account, join a new social media platform or use a majority of online services—you will typically be ask...

Overview of Digital Transformation Security: What, How, and Why?

Blog Published: 02/06/2023

A version of this blog was originally published by ScaleSec. By Justin Travis, ScaleSec. Cloud Security Alliance and ScaleSec are pleased to co-publish this security deep dive into Digital Transformation as part of promoting the upcoming Virtual CSA FinCloud Security Summit. Cloud Security Alli...

Exposed Remote Desktop Protocol Actively Targeted by Threat Actors to Deploy Ransomware

Blog Published: 02/06/2023

Originally published by Cyble on December 2, 2022. Cyble Global Sensors Intelligence and Darkweb findings show TAs actively targeting RDP Cyble Research and Intelligence Labs (CRIL) discovered multiple ransomware groups targeting open Remote Desktop Protocol (RDP) ports. RDP allows users to acces...

Social Media Traffic Monitoring – From Thought Police to Security Priority

Blog Published: 02/06/2023

Originally published by Netography. Written by Mal Fitzgerald, Sales Engineer, Netography. It seems as though every week we hear about another government agency that has banned a specific social media platform from their government-issued devices. There are a multitude of reasons for banning soci...

CCSK Success Story: From the Head of IT Infrastructure and Security

Blog Published: 02/03/2023

This is part of a blog series interviewing cybersecurity professionals who have earned their Certificate of Cloud Security Knowledge (CCSK). In these blogs we invite individuals to share some of the challenges they face in managing security for cloud computing and how they were able to leverage k...

Shift Left, Save Resources: DevSecOps and the CI/CD Pipeline

Blog Published: 02/03/2023

Originally published by CXO REvolutionaries. Written by Gary Parker, Field CTO - AMS, Zscaler. Reaching the final phase of the software development lifecycle only to discover a significant security flaw is a waste of time, money, and effort. That’s why integrating security checks into the continu...

Beyond BEC: How Modern Phishing Has Evolved Past Email

Blog Published: 02/02/2023

Originally published by Lookout. Written by Hank Schless, Lookout. Business email compromise (BEC) is big business for malicious actors. According to the 2021 FBI Internet Crime Report, BEC was responsible for nearly $2.4 billion in cyber crime losses in 2021. At its root, it’s a type of ph...

Reframing Password Management: What We Learned from the LastPass Breach

Blog Published: 02/02/2023

Originally published by BARR Advisory. In August of 2022, LastPass, the cloud-based password saver, was breached as bad actors stole information that would eventually lead them to access a copy of the data vaults of tens of thousands of customers. When the firm was hacked for a second time in Nov...

Does Cloud Log Management Shield You From Threats? CloudTrail vs CloudWatch

Blog Published: 02/01/2023

Originally published by Sysdig. Written by Brett Wolmarans, Sysdig. What is different about cloud log management versus on-premises? The answer may seem simple, but several elements such as CloudTrail vs. CloudWatch come into play. In this article, we will cover some of the most important differe...

A Checklist for CSA’s Cloud Controls Matrix v4

Blog Published: 02/01/2023

Originally published by NCC Group. Written by Nandor Csonka, Director of Cloud Security, NCC Group. The Cloud Security Alliance (CSA) Cloud Controls Matrix (CCM) is an internationally recognized framework that helps cloud service providers (CSPs) and cloud service customers (CSCs) manage risk. Wh...

“Hi ChatGPT, please help Cybersecurity”

Blog Published: 01/31/2023

“Cloud is just a bunch of APIs,” said Mark Russinovich of Microsoft at CSA’s SECtember 2021 conference. Mark was simplifying the definition of cloud to get after the essential characteristic that has allowed it to flourish and conquer other forms of computing. The on-demand provisioning of comput...

FedRAMP Certification: An Overview of Why It Matters

Blog Published: 01/31/2023

Originally published by Titaniam. Cybersecurity is now in the spotlight as data breaches become a near-daily story. Organizations are consuming massive amounts of personal data that is directly tied to everyday people, and they’re often utilizing cloud-based services to help store them. This can ...

How to Avoid Cybersecurity Whack-a-Mole

Blog Published: 01/31/2023

Originally published by Nasuni on November 8, 2022. Written by Jason Patterson, Nasuni. Although Cybersecurity Awareness Month is behind us now, that is no reason to take the focus off the subject. This year’s theme – “See Yourself in Cyber” – highlighted the fact that strong security really come...

How Confident Are You in Your Security Posture?

Blog Published: 01/30/2023

Originally published by Contino. Written by Marcus Maxwell, Security Practice Lead, Contino. Comparison might be the thief of joy, but it can also be a vital sign that you’re on the right (or wrong) track. Our customers often ask us how their security postures compare to those of other organisati...

Securing Cloud Workloads in 5 Easy Steps

Blog Published: 01/30/2023

Originally published by Tigera. Written by Senthil Nithiyananthan, Tigera. As organizations transition from monolithic services in traditional data centers to microservices architecture in a public cloud, security becomes a bottleneck and causes delays in achieving business goals. Traditional sec...

CircleCI Cybersecurity Incident Hunting Guide

Blog Published: 01/30/2023

Originally published by Mitiga. Written by Doron Karmi, Deror Czudnowski, Ariel Szarf, and Or Aspir, Mitiga. On January 4, CircleCI published a statement announcing the investigation of a security incident. In this technical blog, we will share how to hunt for malicious behavior that may be cause...

What is a Cloud Incident Response Plan?

Blog Published: 01/28/2023

Written by the Cloud Incident Response Working Group. In today’s connected era, a comprehensive incident response strategy is an integral aspect of any organization aiming to manage and lower its risk profile. Many organizations and enterprises without a solid incident response plan have been rud...

Looking for the CCM?

Start using the Cloud Controls Matrix to simplify compliance with multiple standards & regulations.