What Any Executive Needs to Know About Zero Trust
Blog Published: 10/21/2022
Why should a company executive be interested in Zero Trust? Isn’t that supposed to be obvious? Apparently, it’s not; otherwise, we wouldn’t have nearly 1 billion successful ransomware attacks between January 2021 and June 2022.Whether we like it or not, lately, Zero Trust is becoming synonymous w...
Higher Ed Campuses Have Digitized: Protecting Sensitive Data Requires a Unified Approach
Blog Published: 10/21/2022
Originally published by Lookout here. Written by Tony D'Angelo, Vice President, Public Sector, Lookout. Higher education institutions have long been subjected to ransomware and other cyber attacks, which has had a huge impact on their operations. In 2020 alone, ransomware attacks affected nearly ...
As Gaming Moves to the Cloud, Web App Attacks Multiply
Blog Published: 10/21/2022
Originally published by Ericom here. Written by Gerry Grealish, Ericom CMO. The online gaming industry is huge and growing fast. Sales topped $193 billion in 2021 and are anticipated to reach almost $211 billion by 2025. Attacks on the industry are increasing as well, as cybercriminals, inclu...
Everything You Need to Know About Social Engineering
Blog Published: 10/20/2022
Originally published by BARR Advisory here. Written by Claire McKenna, BARR Advisory. Uber is the latest prominent company to have a security breach as a result of social engineering. They’re not alone—just this year, Microsoft, Okta, and Cisco have all had security incidents due to social engine...
New Study from Cloud Security Alliance and BigID Finds That Organizations Are Struggling to Track, Secure Sensitive Data in the Cloud
Press Release Published: 10/20/2022
Over 1,500 IT and security professionals reveal the state of cloud data security in 2022SEATTLE – Oct. 20, 2022 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications and best practices to help ensure a secure cloud computing environm...
How to Wrap Your Cybersecurity Plan Around an Attacker’s Mindset
Blog Published: 10/20/2022
Originally published by Ermetic here. Written by Diane Benjuya, Ermetic. Have you ever wondered why an attacker might be interested specifically in your organization? In this post we deconstruct the attacker’s PoV and what you can do to defend against it.Understanding the attacker’s point of view...
Cloud Security Alliance Partners with SecurityScorecard
Press Release Published: 10/20/2022
Agreement will help speed the advancement of continuous cyber risk monitoring across industriesSEATTLE – Oct. 20, 2022 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications and best practices to help ensure a secure cloud computing e...
Understand. Automate. Eliminate. How to Manage Cloud Infrastructure Risk Today.
Blog Published: 10/20/2022
Originally published by Secberus here. Written by Fausto Lendeborg, Co-founder and Chief Customer Officer, Secberus. When it comes to governing risk (specifically when remediating cloud infrastructure misconfigurations) there are three common goals we hear from security leaders: Understand your s...
The String (Cheese) Theory of Zero Trust
Blog Published: 10/19/2022
Originally published by CXO REvolutionaries here. Written by Martyn Ditchburn, Director of Transformation Strategy, Zscaler. I regularly get asked, “How did you drive the change from the traditional data center and legacy architecture to a new paradigm of 100% cloud, DevNetSecOps, and zero trust ...
Transform Your Cybersecurity Landscape with Governance-Driven Cloud Security
Blog Published: 10/19/2022
Written by Sanjay Karandikar, Global Practice Head, Identity & Access Management, Cybersecurity & GRC Services, HCLTech. Cloud adoption cannot wait. Gartner analysts say that from 30% in 2021, over 95% of new digital workloads will be hosted on cloud-native platforms by 2025. It reaps sig...
Zero Day Remediation Tips: Preparing for the Next Vulnerability
Blog Published: 10/19/2022
Originally published by ThirdPartyTrust here. Written by Sabrina Pagnotta, ThirdPartyTrust. Software vulnerabilities are inevitable, but you can reduce their impact by acting fast. Follow these zero day remediation tips if you think your organization might be vulnerable to a newly discovered zero...
7 Best Practices for Cloud Incident Response
Blog Published: 10/18/2022
Originally published by Mitiga here. Written by Matthew Stephen, Mitiga. You may have heard the saying that it is not a matter of “if” but “when” you will experience a breach. An attack could be targeted or opportunistic, performed by a nation-state or a less sophisticated threat actor, focused o...
Why Gaming Companies Should Follow the MPA’s Lead
Blog Published: 10/18/2022
Originally published by Ericom here. Written by Tova Osofsky, Ericom. Grand Theft Auto 6 Leaks Hit Rockstar Hard In the wake of what they characterized as a “network intrusion in which an unauthorized third party illegally accessed and downloaded… early development footage for the next Gran...
Why is Data Resilience Important?
Blog Published: 10/18/2022
Originally published by ShardSecure here. Written by Marc Blackmer, VP of Marketing, ShardSecure. What is data resilience? Data resilience can mean different things to different organizations. As a Carnegie Mellon University literature review notes, the concept of resilience is often used inf...
Do You See Yourself in Cyber? | Protect Yourself During Cybersecurity Awareness Month
Blog Published: 10/17/2022
Originally published by Alert Logic by HelpSystems on October 1, 2022. Written by Antonio Sanchez, Alert Logic. There’s more than ghosts and goblins to be on the lookout for in October. Phishers, hackers, and other nefarious characters are on the prowl – every day – trying to infiltrate your digi...
SOARs vs. No-Code Security Automation: The Case for Both
Blog Published: 10/17/2022
Originally published by The New Stack. Also published by Torq here. Written by Chris Tozzi, Torq. Just a few years ago, security orchestration, automation and response (SOAR) was the new buzzword associated with security modernization.Today, however, SOAR platforms are increasingly assuming a leg...
Top Threat #5 to Cloud Computing: Insecure Software Development
Blog Published: 10/17/2022
Written by the CSA Top Threats Working Group.The CSA Top Threats to Cloud Computing Pandemic Eleven report aims to raise awareness of threats, vulnerabilities, and risks in the cloud. The latest report highlights the Pandemic Eleven top threats, in which the pandemic and the complexity of workloa...
Misconfigurations 101: The Three V’s of SaaS App Configurations Weaknesses
Blog Published: 10/14/2022
Originally published by Adaptive Shield here. The ease with which SaaS apps can be deployed and adopted is remarkable, but it has quickly become a double-edged sword. On one hand, the availability of SaaS tools enables employees to work from anywhere. For IT and security teams however, the adopti...
What is Cloud Data Security?
Blog Published: 10/14/2022
Originally published by Laminar Security here. Written by Andy Smith, Laminar Security. Shifting to the cloud is a necessary step in the digital transformation required for businesses to get and stay ahead. The cloud allows employees to access resources from almost anywhere at any time, enhances ...
Best Defense? Good Cloud Offense
Blog Published: 10/14/2022
Originally published by Cloudtango here. Written by Jordi Vilanova, Cloudtango. Ever since cybersecurity began in the 70s, the focus was always building a good defense as part of the main strategy. The problem with conventional security has traditionally been its reactive nature to security, such...