Cloud 101CircleEventsBlog

All Articles

All Articles
Preventing Hyperjacking in a Virtual Environment

Blog Published: 11/29/2022

Originally published by Entrust. Written by Iain Beveridge and Dave Stevens, Entrust. In the rapidly evolving world of information security, attack vectors, and cyberattacks, there is a regular cadence of new industry terms to grapple with. Hyperjacking is a term you may not have come across. It ...

How to Get CMMC Certified

Blog Published: 11/29/2022

Originally published by Schellman. Written by Todd Connor, Senior Associate, Schellman.For those of you considering CMMC, this new certification affecting contractors in the Defense Industrial Base (DIB) defines three levels—your level of certification will depend on the types of DoD information ...

4 Important Compliance Management Tasks for Startups

Blog Published: 11/28/2022

Originally published by A-LIGN. The ongoing increase in cyberattacks has emphasized the importance of cybersecurity and compliance management, especially for startups still gaining market share. As startups work to win new customers, they may have to overcome a prospect’s fears that as an organiz...

Password Hash Cracking, User Cloning, and User Impersonation: Three Risks Every SAP Customer Should Know

Blog Published: 11/28/2022

Originally published by Onapsis. Written by Thomas Fritsch, Onapsis. The easiest (and a significantly profitable) way for attackers to get into a system is logging in with valid user credentials. According to a recent report, breaches that are caused by stolen or compromised credentials are not o...

Tailoring Your Zero Trust Transformation to Your Pain Points

Blog Published: 11/28/2022

Originally published by CXO REvolutionaries. Written by Gary Parker, Field CTO - AMS, Zscaler. Zero trust is often likened to a journey. And, as the proverb says, even a journey of a thousand miles begins with a single step.But where to start? For better or for worse, there’s no single embarkatio...

CCSK Success Story: From an IT and Cloud Security Manager

Blog Published: 11/23/2022

This is part of a blog series interviewing cybersecurity professionals who have earned their Certificate of Cloud Security Knowledge (CCSK). In these blogs we invite individuals to share some of the challenges they face in managing security for cloud computing and how they were able to leverage k...

Beating IT’s Bad Rap: How CXOs Can Maintain a Positive Corporate Presence

Blog Published: 11/23/2022

Originally published by CXO REvolutionaries. Written by Gary Parker, Field CTO - AMS, Zscaler. Winston Churchill famously said, “never let a good crisis go to waste.” But, if a CXO only appears in front of the board when trying to keep their job after a cyber incident, a crisis may well lay waste...

How to Use Threat Intelligence to Combat Targeted Attacks

Blog Published: 11/23/2022

Written by Alex Vakulov Threat Intelligence (TI) is one of the most complex and, at the same time, important elements of information security. Threat Intelligence collects information about hacker groups, their techniques and tactics. It provides threat prediction, helps detect attacks, and suppl...

An Interview with One of the Developers of CSA’s Zero Trust Training

Blog Published: 11/22/2022

These days, Zero Trust is a term that you can’t seem to get away from - and you shouldn’t want to! Zero Trust is based on the principle that no part of a computing and networking system can be implicitly trusted, including the humans operating it. This concept codifies an evolutionary approach to...

Web 3.0 Security Issues: What Your Company Needs to Know for 2023

Blog Published: 11/22/2022

Originally published by TokenEx. Written by Anni Burchfiel, TokenEx. The world wide web had its first major shift when blogging and forum capabilities were added to web alongside the established collection of static company websites. The ability for anyone to add their own content to the web, tho...

Cloud First, Security Second?

Blog Published: 11/22/2022

Originally published by Thales. Written by Chad Couser, Director, Marketing Communications, Thales. Cloud solutions were a lifesaver for organizations during the height of the COVID-19 pandemic as employees worked remotely or went hybrid and businesses pivoted their technology strategies to keep ...

Removing the Fog from Cloud Compliance

Blog Published: 11/22/2022

Originally published by Axonius. Written by Shlomit Alon, Axonius. “When I was told our company needs to ensure we’re cloud compliant, I was scratching my head, unsure where to begin.”Does that quote sound familiar? A risk analyst at a company wasn’t sure where to reduce risks in the foreboding ...

Diving Deeply into IAM Policy Evaluation – Highlights from AWS re:Inforce IAM433

Blog Published: 11/21/2022

Originally published by Ermetic. Written by Noam Dahan, Ermetic. IAM433 has a good explanation of how and why permissions boundaries can be circumvented by resource policies. There’s a repeat tomorrow but it’s not recorded (chalk talk). This presentation should be made public and linked from th...

Top 5 Configurations to Check When Setting Up a New SaaS App

Blog Published: 11/21/2022

Originally published by Adaptive Shield. Written by Hananel Livneh, Adaptive Shield. The old days of buying new software, installing it on the company servers, and making sure everything works is gone. All hail the new IT king - SaaS platforms. Ready to go from the start, no installation needed, ...

Inoculate Your Company Against Security Data Gaps to Develop Cyber Immunity

Blog Published: 11/21/2022

Written by Arti Raman, CEO and Founder, Titaniam. Protecting sensitive customer data, or personally identifiable information (PII), is a high priority for companies in verticals ranging from financial services to healthcare and retail. Chief information security officers (CISOs) for these ind...

Top Threat #9 to Cloud Computing: Misconfiguration and Exploitation of Serverless and Container Workloads

Blog Published: 11/20/2022

Written by the CSA Top Threats Working Group.The CSA Top Threats to Cloud Computing Pandemic Eleven report aims to raise awareness of threats, vulnerabilities, and risks in the cloud. The latest report highlights the Pandemic Eleven top threats, in which the pandemic and the complexity of workloa...

IoT Vulnerabilities and Security Concerns

Blog Published: 11/19/2022

In Part 1 of this blog, we covered the many reasons that Internet of Things (IoT) security is needed and should be properly funded. Now, to help you understand how to design and develop IoT products securely, we will explain some of the challenges security engineers face when dealing with IoT dev...

CSA Chapter Success Story: An Interview with the Japan Chapter Director

Blog Published: 11/19/2022

CSA’s chapters are made up of security professionals who volunteer to increase cloud security awareness in their local area and provide outreach for CSA research, education, and training resources. They work to solve cloud vulnerabilities and challenges by collaborating with other local experts i...

The New ISO/IEC 27001:2022 Standard’s Impact on the CSA STAR Certification

Blog Published: 11/18/2022

Written by Ashwin Chaudhary, CEO, Accedere. Introduction The most awaited third edition of ISO/IEC 27001:2022 was published on 25th October 2022, after the publication of ISO 27002:2022 in February 2022. If you are planning on transitioning to the newly updated standard, then your major focus s...

Anatomy of a Cyber Attack (and What You Can Do About It)

Blog Published: 11/18/2022

Originally published by TrueFort. Written by Matt Hathaway, TrueFort. Security criminals know how IT and security operations work in organizations. They know and exploit common weaknesses. To effectively protect against them, security teams need to turn the tables and get inside the attackers’ br...

Looking for the CCM?

Start using the Cloud Controls Matrix to simplify compliance with multiple standards & regulations.