Prepare for Passing the CCAK Exam
Blog Published: 07/27/2021
The Certificate of Cloud Auditing Knowledge (CCAK) is the first credential available for industry professionals to demonstrate their expertise in the essential principles of auditing cloud computing systems. Developed by CSA and ISACA, the CCAK credential and training program fills the need fo...
Remote working strategy: desktop virtualization or remote access?
Blog Published: 02/22/2021
This blog was originally published on Wandera.com.Written by Alex Wells from WanderaCreating a technology roadmap for your business can feel like an impossible task as there is always something new on the horizon that you need to account for. It doesn’t help that analysts are trying to predict...
Building Confidence in Quantum-Resistant Algorithms: How much analysis is needed?
Blog Published: 02/25/2021
Written Roberta Faux, Lead Author and Quantum-safe Security Working Group MemberThe CSA Quantum-Safe Security Working Group has produced a new white paper, “Confidence in Post Quantum Algorithms.” This paper attempts to measure the published analysis of post-quantum or quantum-resistant crypto...
2020 Hindsight and 2021 Foresight: Lessons Learned in the Work From Home Era
Blog Published: 02/26/2021
By Lebin ChengOriginally posted by CloudVector It is hard to believe that it has already (or only?) been a year since a global pandemic forced organizations to adapt to the “new normal” of the work from home era. Given the 12-month milestone, now seems like the perfect time to stop and reflect...
A Powerful New Approach to Phishing – the Biggest Issue for Cybersecurity
Blog Published: 03/02/2021
Originally published on Ericom's blog.By Nigel Willis, Ericom Group CTO for EMEAPhishing attacks – which start with emails that appear to come from a legitimate company but are really devised by cybercriminals – are the top delivery mechanism for ransomware. Phishing takes full advantage of hu...
CCAK Frequently Asked Questions
Blog Published: 03/02/2021
What is the Certificate of Cloud Auditing Knowledge? The Certificate of Cloud Auditing Knowledge (CCAK) is a credential that industry professionals can obtain to demonstrate their expertise in understanding the essential principles of auditing cloud computing systems. This credential leverages...
Transforming Your IT Risk Management from Reactive to Proactive in 5 Steps
Blog Published: 03/04/2021
This blog was originally published on Hyperproof's blog.Written by Jingcong Zhao, Director of Content Strategy at HyperproofAs a seasoned IT risk management professional, you already know that staying on top of security is a constant battle. You probably also know that managing IT risks proact...
PCI Compliance Checklist: Ensure Compliance
Blog Published: 03/08/2021
Originally published on TokenEx's blog. You’ve heard about all of the breaches. You know no defense is impenetrable. And you’re likely aware of the risk that comes with storing payment card information.Still, you need to process cardholder data to run your business—that much is unavoidable. So...
The Age of Collaborative Security
Blog Published: 03/09/2021
Written by: Philippe Humeau, CEO, CrowdSecThe Cloud Security Alliance was born from a need, the need to collaborate, whether we are partners or competitors, for the greater good of our industry and its customers. That’s what alliances are made for, to become stronger together.Security wise, fe...
Do You Really Need Kubernetes?
Blog Published: 03/10/2021
This article was originally published on Intezer's blog. Kubernetes is one of the top open-source container orchestration projects, as it dramatically simplifies the creation and management of applications by providing built-in solutions to common problems. Although Kubernetes can be a solutio...
CCSK Success Stories: From a Cloud Digital Security Architect
Blog Published: 03/11/2021
In this blog series we invite individuals to share some of the challenges they face in managing security for cloud computing and how they were able to leverage the Certificate of Cloud Security Knowledge (CCSK) in their current roles. In this blog we'll be interviewing Yogesh, a Cloud Digital ...
Taking a Practical Timely Opportunity to Evaluate the Security of Your Cloud Video Surveillance Solution
Blog Published: 03/10/2021
Written by Stan Mierzwa, M.S., CISSP, Director and Lecturer, Kean University Center for Cybersecurity and Eliot Perez, IT Security Analyst, CSA NJ Chapter These days, it is not unusual to walk too far before you see the endpoint of a video surveillance system. Consider the cameras you have ...
Threat Hunting and Incident Response in Azure Environments
Blog Published: 03/15/2021
This blog was originally published on Garland Technology's website.Contributed by Vijit Nair from Corelight. When cyber-attacks cross the network, grabbing quality and relevant data from network traffic is essential for security operations. This is especially pertinent in cloud environments ...
Incident Response and the Need for Speed
Blog Published: 03/16/2021
This blog was originally published on Vectra.ai When a cyberattack occurs, most aspects of the threat are not under the control of a targeted organization. These range from who is targeting them, what is the motivation, where and when the attack occurs, how well-equipped and skilled that at...
Investment in Cybersecurity During a Recovering Economy
Blog Published: 03/17/2021
This blog was originally published by TokenEx.Written by Alex Pezold, Co-Founder and CEO at TokenEx.Over a year of economic uncertainty driven by the pandemic has led organizations to re-evaluate their budgets. If one thing is apparent, it is that investing in cybersecurity must be a top prior...
CCSK Success Stories: From an IT Security Consultant
Blog Published: 03/19/2021
This is part of a blog series interviewing cybersecurity professionals who have earned their Certificate of Cloud Security Knowledge (CCSK). In these blogs we invite individuals to share some of the challenges they face in managing security for cloud computing and how they were able to leverag...
Cloud Security Alliance Releases Additional Mappings, Update to Cloud Controls Matrix (CCM) v4
Press Release Published: 03/15/2021
Updates allow for streamlined transition to, compliance with CCM v4 and ISO standardsSEATTLE – March 15, 2021 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment,...
Locking Down the Security of AWS IAM
Blog Published: 03/18/2021
This blog was originally published by Fugue, Inc. By Becki Lee, Head Technical Writer, Fugue, Inc. This blog post helps cloud engineers think more critically about cloud misconfiguration — why it occurs, how malicious actors exploit it, and ways to prevent it. Why AWS IAM? Cloud miscon...
Cloud Security Alliance Releases Latest Survey Report on State of Cloud Security Concerns, Challenges, and Incidents
Press Release Published: 03/30/2021
Survey finds that 58% of respondents are concerned about security in the cloud, while misconfigurations are one of the leading causes of breaches and outages, as public cloud adoption doubles over past two yearsSEATTLE – March 30, 2021 – The Cloud Security Alliance (CSA), the world’s leading o...
Cloud Explosion Catapults Privileged Access Management and Identity Security to the Forefront
Blog Published: 03/22/2021
By Justyna Kucharczak from CyberArk 2020 introduced a host of unexpected challenges for cybersecurity teams. Not only must they protect increasingly complex IT environments, they’re now charged with deploying new models to enable mobile and geographically dispersed workforces. As they move ...