Cloud 101CircleEventsBlog

All Articles

All Articles
The Quiet Victories and False Promises of Machine Learning in Security

Blog Published: 10/24/2022

Originally published by Dark Reading and Sysdig. Written by Anna Belak, Sysdig. Contrary to what you might have read on the Internet, machine learning (ML) is not magic pixie dust. It’s a broad collection of statistical techniques that allows us to train a computer to estimate an answer to a ques...

Traditional Data Security Tools Fail at 60% Rate

Blog Published: 10/24/2022

Written by Titaniam. Titaniam’s ‘State of Data Exfiltration & Extortion Report’ shows that organizations may be less protected from security threats than they believe. Ransomware is becoming more and more about extortion, and current data loss prevention tactics aren’t measuring up to the cha...

CCSK Success Stories: From a Regional Information Security Officer

Blog Published: 10/23/2022

This is part of a blog series interviewing cybersecurity professionals who have earned their Certificate of Cloud Security Knowledge (CCSK). In these blogs we invite individuals to share some of the challenges they face in managing security for cloud computing and how they were able to leverage k...

Using the CSA STAR Consensus Assessment Initiative Questionnaire (CAIQ) as a Procurement Tool

Blog Published: 10/22/2022

IntroductionThe CSA STAR Consensus Assessment Initiative Questionnaire (CAIQ) is an industry-wide initiative to standardize security and risk management assessments of cloud computing vendors. The CAIQ was developed to provide a consistent way for cloud service providers (CSPs), customers, and th...

Responding to and Recovering from a Ransomware Attack

Blog Published: 10/22/2022

Thanks to Dr. Jim Angle, Michael Roza, and Vince Campitelli After learning what ransomware is, how to protect your organization against it, and how to detect it, it’s time to learn how to respond and recover if a ransomware attack occurs. In this blog, we’ll explain how to mitigate and contain a ...

What Any Executive Needs to Know About Zero Trust

Blog Published: 10/21/2022

Why should a company executive be interested in Zero Trust? Isn’t that supposed to be obvious? Apparently, it’s not; otherwise, we wouldn’t have nearly 1 billion successful ransomware attacks between January 2021 and June 2022.Whether we like it or not, lately, Zero Trust is becoming synonymous w...

Higher Ed Campuses Have Digitized: Protecting Sensitive Data Requires a Unified Approach

Blog Published: 10/21/2022

Originally published by Lookout here. Written by Tony D'Angelo, Vice President, Public Sector, Lookout. Higher education institutions have long been subjected to ransomware and other cyber attacks, which has had a huge impact on their operations. In 2020 alone, ransomware attacks affected nearly ...

As Gaming Moves to the Cloud, Web App Attacks Multiply

Blog Published: 10/21/2022

Originally published by Ericom here. Written by Gerry Grealish, Ericom CMO. The online gaming industry is huge and growing fast. Sales topped $193 billion in 2021 and are anticipated to reach almost $211 billion by 2025. Attacks on the industry are increasing as well, as cybercriminals, inclu...

Everything You Need to Know About Social Engineering

Blog Published: 10/20/2022

Originally published by BARR Advisory here. Written by Claire McKenna, BARR Advisory. Uber is the latest prominent company to have a security breach as a result of social engineering. They’re not alone—just this year, Microsoft, Okta, and Cisco have all had security incidents due to social engine...

New Study from Cloud Security Alliance and BigID Finds That Organizations Are Struggling to Track, Secure Sensitive Data in the Cloud

Press Release Published: 10/20/2022

Over 1,500 IT and security professionals reveal the state of cloud data security in 2022SEATTLE – Oct. 20, 2022 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications and best practices to help ensure a secure cloud computing environm...

How to Wrap Your Cybersecurity Plan Around an Attacker’s Mindset

Blog Published: 10/20/2022

Originally published by Ermetic here. Written by Diane Benjuya, Ermetic. Have you ever wondered why an attacker might be interested specifically in your organization? In this post we deconstruct the attacker’s PoV and what you can do to defend against it.Understanding the attacker’s point of view...

Cloud Security Alliance Partners with SecurityScorecard

Press Release Published: 10/20/2022

Agreement will help speed the advancement of continuous cyber risk monitoring across industriesSEATTLE – Oct. 20, 2022 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications and best practices to help ensure a secure cloud computing e...

Understand. Automate. Eliminate. How to Manage Cloud Infrastructure Risk Today.

Blog Published: 10/20/2022

Originally published by Secberus here. Written by Fausto Lendeborg, Co-founder and Chief Customer Officer, Secberus. When it comes to governing risk (specifically when remediating cloud infrastructure misconfigurations) there are three common goals we hear from security leaders: Understand your s...

The String (Cheese) Theory of Zero Trust

Blog Published: 10/19/2022

Originally published by CXO REvolutionaries here. Written by Martyn Ditchburn, Director of Transformation Strategy, Zscaler. I regularly get asked, “How did you drive the change from the traditional data center and legacy architecture to a new paradigm of 100% cloud, DevNetSecOps, and zero trust ...

Transform Your Cybersecurity Landscape with Governance-Driven Cloud Security

Blog Published: 10/19/2022

Written by Sanjay Karandikar, Global Practice Head, Identity & Access Management, Cybersecurity & GRC Services, HCLTech. Cloud adoption cannot wait. Gartner analysts say that from 30% in 2021, over 95% of new digital workloads will be hosted on cloud-native platforms by 2025. It reaps sig...

Zero Day Remediation Tips: Preparing for the Next Vulnerability

Blog Published: 10/19/2022

Originally published by ThirdPartyTrust here. Written by Sabrina Pagnotta, ThirdPartyTrust. Software vulnerabilities are inevitable, but you can reduce their impact by acting fast. Follow these zero day remediation tips if you think your organization might be vulnerable to a newly discovered zero...

7 Best Practices for Cloud Incident Response

Blog Published: 10/18/2022

Originally published by Mitiga here. Written by Matthew Stephen, Mitiga. You may have heard the saying that it is not a matter of “if” but “when” you will experience a breach. An attack could be targeted or opportunistic, performed by a nation-state or a less sophisticated threat actor, focused o...

Why Gaming Companies Should Follow the MPA’s Lead

Blog Published: 10/18/2022

Originally published by Ericom here. Written by Tova Osofsky, Ericom. Grand Theft Auto 6 Leaks Hit Rockstar Hard In the wake of what they characterized as a “network intrusion in which an unauthorized third party illegally accessed and downloaded… early development footage for the next Gran...

Why is Data Resilience Important?

Blog Published: 10/18/2022

Originally published by ShardSecure here. Written by Marc Blackmer, VP of Marketing, ShardSecure. What is data resilience? Data resilience can mean different things to different organizations. As a Carnegie Mellon University literature review notes, the concept of resilience is often used inf...

Do You See Yourself in Cyber? | Protect Yourself During Cybersecurity Awareness Month

Blog Published: 10/17/2022

Originally published by Alert Logic by HelpSystems on October 1, 2022. Written by Antonio Sanchez, Alert Logic. There’s more than ghosts and goblins to be on the lookout for in October. Phishers, hackers, and other nefarious characters are on the prowl – every day – trying to infiltrate your digi...

Looking for the CCM?

Start using the Cloud Controls Matrix to simplify compliance with multiple standards & regulations.