Tailoring Your Zero Trust Transformation to Your Pain Points
Blog Published: 11/28/2022
Originally published by CXO REvolutionaries. Written by Gary Parker, Field CTO - AMS, Zscaler. Zero trust is often likened to a journey. And, as the proverb says, even a journey of a thousand miles begins with a single step.But where to start? For better or for worse, there’s no single embarkatio...
CCSK Success Story: From an IT and Cloud Security Manager
Blog Published: 11/23/2022
This is part of a blog series interviewing cybersecurity professionals who have earned their Certificate of Cloud Security Knowledge (CCSK). In these blogs we invite individuals to share some of the challenges they face in managing security for cloud computing and how they were able to leverage k...
Beating IT’s Bad Rap: How CXOs Can Maintain a Positive Corporate Presence
Blog Published: 11/23/2022
Originally published by CXO REvolutionaries. Written by Gary Parker, Field CTO - AMS, Zscaler. Winston Churchill famously said, “never let a good crisis go to waste.” But, if a CXO only appears in front of the board when trying to keep their job after a cyber incident, a crisis may well lay waste...
How to Use Threat Intelligence to Combat Targeted Attacks
Blog Published: 11/23/2022
Written by Alex Vakulov Threat Intelligence (TI) is one of the most complex and, at the same time, important elements of information security. Threat Intelligence collects information about hacker groups, their techniques and tactics. It provides threat prediction, helps detect attacks, and suppl...
An Interview with One of the Developers of CSA’s Zero Trust Training
Blog Published: 11/22/2022
These days, Zero Trust is a term that you can’t seem to get away from - and you shouldn’t want to! Zero Trust is based on the principle that no part of a computing and networking system can be implicitly trusted, including the humans operating it. This concept codifies an evolutionary approach to...
Web 3.0 Security Issues: What Your Company Needs to Know for 2023
Blog Published: 11/22/2022
Originally published by TokenEx. Written by Anni Burchfiel, TokenEx. The world wide web had its first major shift when blogging and forum capabilities were added to web alongside the established collection of static company websites. The ability for anyone to add their own content to the web, tho...
Cloud First, Security Second?
Blog Published: 11/22/2022
Originally published by Thales. Written by Chad Couser, Director, Marketing Communications, Thales. Cloud solutions were a lifesaver for organizations during the height of the COVID-19 pandemic as employees worked remotely or went hybrid and businesses pivoted their technology strategies to keep ...
Removing the Fog from Cloud Compliance
Blog Published: 11/22/2022
Originally published by Axonius. Written by Shlomit Alon, Axonius. “When I was told our company needs to ensure we’re cloud compliant, I was scratching my head, unsure where to begin.”Does that quote sound familiar? A risk analyst at a company wasn’t sure where to reduce risks in the foreboding ...
Diving Deeply into IAM Policy Evaluation – Highlights from AWS re:Inforce IAM433
Blog Published: 11/21/2022
Originally published by Ermetic. Written by Noam Dahan, Ermetic. IAM433 has a good explanation of how and why permissions boundaries can be circumvented by resource policies. There’s a repeat tomorrow but it’s not recorded (chalk talk). This presentation should be made public and linked from th...
Top 5 Configurations to Check When Setting Up a New SaaS App
Blog Published: 11/21/2022
Originally published by Adaptive Shield. Written by Hananel Livneh, Adaptive Shield. The old days of buying new software, installing it on the company servers, and making sure everything works is gone. All hail the new IT king - SaaS platforms. Ready to go from the start, no installation needed, ...
Inoculate Your Company Against Security Data Gaps to Develop Cyber Immunity
Blog Published: 11/21/2022
Written by Arti Raman, CEO and Founder, Titaniam. Protecting sensitive customer data, or personally identifiable information (PII), is a high priority for companies in verticals ranging from financial services to healthcare and retail. Chief information security officers (CISOs) for these ind...
Top Threat #9 to Cloud Computing: Misconfiguration and Exploitation of Serverless and Container Workloads
Blog Published: 11/20/2022
Written by the CSA Top Threats Working Group.The CSA Top Threats to Cloud Computing Pandemic Eleven report aims to raise awareness of threats, vulnerabilities, and risks in the cloud. The latest report highlights the Pandemic Eleven top threats, in which the pandemic and the complexity of workloa...
IoT Vulnerabilities and Security Concerns
Blog Published: 11/19/2022
Internet of Things (IoT) devices (also known as "smart devices") represent a wide variety of internet-connected devices. This includes medical devices, cars, drones, simple sensors, and more. They often pose a security challenge because of their limited size and the difficulty of securing IoT dev...
CSA Chapter Success Story: An Interview with the Japan Chapter Director
Blog Published: 11/19/2022
CSA’s chapters are made up of security professionals who volunteer to increase cloud security awareness in their local area and provide outreach for CSA research, education, and training resources. They work to solve cloud vulnerabilities and challenges by collaborating with other local experts i...
The New ISO/IEC 27001:2022 Standard’s Impact on the CSA STAR Certification
Blog Published: 11/18/2022
Written by Ashwin Chaudhary, CEO, Accedere. Introduction The most awaited third edition of ISO/IEC 27001:2022 was published on 25th October 2022, after the publication of ISO 27002:2022 in February 2022. If you are planning on transitioning to the newly updated standard, then your major focus s...
Anatomy of a Cyber Attack (and What You Can Do About It)
Blog Published: 11/18/2022
Originally published by TrueFort. Written by Matt Hathaway, TrueFort. Security criminals know how IT and security operations work in organizations. They know and exploit common weaknesses. To effectively protect against them, security teams need to turn the tables and get inside the attackers’ br...
Access Controls that Move - The Power of Data Security Posture Management
Blog Published: 11/18/2022
Originally published by Sentra. Controlling access to data has always been one of the basics of cybersecurity hygiene. Managing this access has evolved from basic access control lists, to an entire Identity and Access Management industry. IAM controls are great at managing access to applicatio...
Modernize Your Security Architecture with SASE
Blog Published: 11/17/2022
Written by S Sreekumar, VP and Global Practice Head, Infra & Cloud Security, Cybersecurity & GRC Services, HCLTech and Nicole Scheffler, Director of SASE Solutions, Palo Alto Networks. Hybrid and remote working are now the norm, making it critical for organizations to provide secure a...
Change These 7 Security Settings After Creating a New AWS Account
Blog Published: 11/17/2022
Originally published by Varonis. Written by Shane Waterford, Varonis. If you’ve just created your Amazon Web Services (AWS) account and are worried about AWS data security, you have a valid reason — unknown organization-wide settings or simple misconfigurations could put your data at risk of expo...
SANS 2022 Cloud Security Survey, Chapter 1: How Security Questions Are Affecting Cloud Usage Patterns
Blog Published: 11/17/2022
Originally published by Gigamon. Written by Chris Borales, Gigamon. Editor’s note: This post explores Chapter 1 of the SANS 2022 Cloud Security Survey.More and more enterprises have been migrating data and compute power to the cloud — but security woes have followed them there. Over the past seve...