ChaptersEventsBlog
Get Free Early Access to TAISE Module 3! Sample the Certificate Experience Today!

All Articles

All Articles
How Traffic Mirroring in the Cloud Works

Blog Published: 07/08/2019

By Tyson Supasatit, Sr. Product Marketing Manage, ExtraHop Learn how Amazon traffic mirroring and the Azure vTAP fulfill the SOC visibility triadAfter years of traffic mirroring not being available in the cloud, between Amazon VPC traffic mirroring and the Azure vTAP, it's finally here! In thi...

“Shift Left” to Harden Your Cloud Security Posture

Blog Published: 07/18/2019

This article was originally published on Fugue's blog here. By Josh Stella, Co-founder & Chief Technology Officer, FugueAfter a decade-long uneasy courtship with cloud computing, enterprises are migrating their IT systems to platforms like AWS and Azure as fast as they can. This means the ...

Signal vs. Noise: Banker Cloud Stories by Craig Balding

Blog Published: 07/19/2019

A good question to ask any professional in any line of business is: which "industry events" do you attend and why? Over a few decades of attending a wide variety of events - and skipping many more - my primary driver is "signal to noise" ratio. In other words, I look for events attended by p...

4 Reasons Why IT Supervision is a Must in Content Collaboration

Blog Published: 07/23/2019

By István Molnár, Compliance Specialist, TresoritFor many organizations, workflow supervision is one of the biggest challenges to solve. Ideally users should be properly managed and monitored but sadly, countless organizations suffer from a lack of IT supervision. As a result, there is no tell...

FedSTAR Pilot Program Status

Blog Published: 07/24/2019

As the use of cloud technology has become more widespread, the concern about cloud security has increased. Government agencies and private sector users are concerned with protecting data and ensuring service availability. Many countries and private entities have designed and implemented secur...

It's Time for Security Leadership to Embrace the Cloud-First Future

Blog Published: 07/29/2019

By Arif Kareem, CEO and President at ExtraHop NetworksOn the campus at Stanford Business School is a plaque engraved with a quote from Phil Knight, graduate of the business school and co-founder of Nike. I've visited the campus many times, and each time the words stop me in my tracks."There co...

Organizations Must Realign to Face New Cloud Realities

Blog Published: 07/30/2019

Jim Reavis, Co-founder and Chief Executive Officer, CSAWhile cloud adoption is moving fast, many enterprises still underestimate the scale and complexity of cloud threatsTechnology advancements often present benefits to humanity while simultaneously opening up new fronts in the on-going and in...

Use Cases for Blockchain Beyond Cryptocurrency

Blog Published: 07/31/2019

CSA’s white paper, Documentation of Relevant Distributed Ledger Technology and Blockchain Use Cases v2 is a continuation of the efforts made in v1. The purpose of this publication is to describe relevant use cases beyond cryptocurrency for the application of these technologies.In the process o...

Quantum Technology Captures Headlines in the Wall Street Journal

Blog Published: 08/01/2019

By the Quantum-Safe Security Working GroupLast month, we celebrated the 50th anniversary of the Apollo 11 moon landing. Apollo, which captured the imagination of the whole world, epitomizes the necessity for government involvement in long term, big science projects. What started as a fierce ra...

CCM v3.0.1. Update for AICPA, NIST and FedRAMP Mappings

Blog Published: 08/02/2019

Victor Chin and Lefteris Skoutaris, Research Analysts, CSA The CSA Cloud Controls Matrix (CCM) Working Group is glad to announce the new update to the CCM v3.0.1. This minor update will incorporate the following mappings:Association of International Certified Professional Accountants (AICPA) T...

Facebook Project Libra - the good, the bad, the ugly and why you should care

Blog Published: 08/05/2019

By Kurt Seifried, Chief Blockchain Officer, CSASo you’ve probably heard by now that Facebook will be creating a crypto-currency called “Project Libra” and if you haven’t well, now you know.So first let’s cover what is good about this. Facebook has announced Project Libra as a Stablecoin, its v...

The Cloud in the Fight Against Cyber-Bullying

Blog Published: 08/07/2019

By the Cybersecurity International Institute (CSI)Learn about the upcoming innovative social project on Cyber-bullying using a cloud platform.The CSI Institute (Cybersecurity International Institute) is a non-governmental and not-for-profit organization. Our goal is to contribute to the inform...

Challenges & Best Practices in Securing Application Containers and Microservices

Blog Published: 08/08/2019

By Anil Karmel, Co-Chair, CSA Application Containers and Microservices (ACM) Working GroupApplication Containers have a long and storied history, dating back to the early 1960s with virtualization on mainframes up to the 2000s with the release of Solaris and Linux Containers (LXC). The rise of...

Uncovering the CSA Top Threats to Cloud Computing with Jim Reavis

Blog Published: 08/08/2019

By Greg Jensen, Sr. Principal Director - Security Cloud Business Group, OracleFor the few that attend this year’s BlackHat conference kicking off this week in Las Vegas, many will walk away with an in depth understanding and knowledge on risk as well as actionable understandings on how they ca...

A Technical Analysis of the Capital One Cloud Misconfiguration Breach

Blog Published: 08/09/2019

This article was originally published on Fugue's blog hereBy Josh Stella, Co-founder & Chief Technology Officer, FugueThis is a technical exploration of how the Capital One breach might have occurred, based on the evidence we have from the criminal complaint. I want to start by saying that...

Cloud Security Alliance's D.C. Metro Area Chapter announces the event of the year: the Cybersecurity Cruise!

Blog Published: 08/12/2019

By: Anil Karmel, President, CSA-DC Chapter & Co-Founder and CEO of C2 Labs, Inc. About a year ago, CSA recognized the need to establish a local chapter serving the unique needs of the Washington D.C. Metro Area. It's been my honor and privilege to serve as the President of this new Chapte...

Egregious 11 Meta-Analysis Part 1: (In)sufficient Due Diligence and Cloud Security Architecture and Strategy

Blog Published: 08/13/2019

By Victor Chin, Research Analyst, CSA On August 6th, 2019, the CSA Top Threats working group released the third iteration of the Top Threats to Cloud Computing report. This is the first blog post in the series where we analyze the security issues in the new iteration of the Top Threats to Clou...

On-Chain vs Off-Chain governance. What are the rules to Calvinball?

Blog Published: 08/26/2019

By Kurt Seifried, Chief Blockchain Officer, CSAIf you don’t know what Calvin and Hobbes is you can skip the next bit, but it is amusing. Calvinball is a game invented by Calvin and Hobbes. Calvinball has no rules; the players make up their own rules as they go along, making it so that no Calvi...

Egregious 11 Meta-Analysis Part 2: Virtualizing Visibility

Blog Published: 08/28/2019

By Victor Chin, Research Analyst, CSAThis is the second blog post in the series where we analyze the security issues in the new iteration of the Top Threats to Cloud Computing report. Each blog post features a security issue that is being perceived as less relevant and one that is being percei...

Security Spotlight: iPhones Susceptible to a Hack via Text

Blog Published: 09/04/2019

By Juan Lugo, Product Marketing Manager at BitglassHere are the top stories of recent weeks: iPhones Susceptible to a Hack via TextDemocratic Senate campaign group exposed emails of 6.2 million AmericansState Farm says Hackers Successfully Conducted a Credentials Stuffing Attack96 Million Str...

Looking for the CCM?

Start using the Cloud Controls Matrix to simplify compliance with multiple standards & regulations.