A Moment in Time: SECtember
Blog Published: 07/12/2021
Our fortunes are often dictated not just by what we do, but when we do it. Understanding that special “moment in time” when we can do great things with our lives, our business, our world is not easy. In my mentoring of colleagues, I try to stress the importance of being able to take a “step ba...
Machine Learning in Identity and Access Management
Blog Published: 07/14/2021
This blog was originally published by ZTEdge hereWritten by Leo Versola, ZTEdge In recent years, artificial intelligence and machine learning have been quietly transforming industries from agriculture and education to healthcare, marketing, and customer service. In 2018 over 60,000 US patent ...
2021 State of Cloud Security Posture Management Report
Blog Published: 07/16/2021
This blog was originally published by OpsCompass here.We recently announced the results of a report we conducted on cloud security and management challenges. The “2021 State of Cloud Security Posture Management Report” is based on survey responses from 253 full-time, US-based, IT professionals...
Scaling GRC Programs: 5 Ways Security Leaders Enable the Business
Blog Published: 07/19/2021
This blog was originally published by OneTrust GRC here.The compliance landscape is in constant flux between external factors changing and businesses working toward scaling GRC programs. Managing compliance is difficult for organizations operating across multiple geographies with multiple sets...
Six Key Characteristics of a Modern ZTNA Solution
Blog Published: 07/20/2021
This blog was originally published by Bitglass hereWritten by Jeff Birnbaum, BitglassEven as organizations continue adoption of cloud technologies, the need for secure access to on-premises resources has not gone away. In fact, as many companies navigate a return to the office while simultaneo...
Chris Krebs, Former Director of the Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA) to Headline Cloud Security Alliance’s SECtember
Press Release Published: 07/07/2021
Chris Krebs, Former Director of the Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA) to Headline Cloud Security Alliance’s SECtemberRegistration opens today for industry’s premier cloud event, which will address demand for rapid cloud adoption accelerat...
Cloud Security Alliance Establishes New Greater China Region Headquarters in Shanghai
Press Release Published: 07/16/2021
Cloud Security Alliance Establishes New Greater China Region Headquarters in ShanghaiShanghai, China – July 9, 2021 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications and best practices to help ensure a secure cloud computing e...
Building the Next Generation of Cybersecurity and Privacy Professionals
Blog Published: 07/20/2021
ContextIn the past two decades we have witnessed a dramatic evolution in the cyber domain; new technologies have revolutionized the world we live in, our habits, our behaviors and our way of thinking. Cloud Computing, Edge Computing, Internet of Things/Everything, Smart Environments, Artificia...
Identity and PAM meet in the Cloud
Blog Published: 07/21/2021
By Ravi Erukulla, Sr. Director of Product Management, Saviynt, Inc and Shamun Mahmud, Sr. Research Analyst, CSAAt the end of 2020, CSA published The 2020 State of Identity Security in the Cloud.Goals of the study Determine the use and challenges of public cloud workloads today and 1 year from ...
Detecting new crypto-mining attack targeting Kubeflow and TensorFlow
Blog Published: 07/23/2021
This blog was originally published by Sysdig hereWritten by Stefano Chierici, Security Researcher, SysdigMicrosoft has discovered a new large-scale attack targeting Kubeflow instances to deploy malicious TensorFlow pods, using them to mine Monero cryptocurrency in Kubernetes cluster environmen...
Deep Dive into the NSA Funded MITRE D3FEND Framework
Blog Published: 07/26/2021
This blog was originally published by Blue Hexagon here.Written by Saumitra Das, Blue Hexagon.MITRE released the D3FEND framework on 6/22/21, an effort funded by the National Security Agency to effectively create a knowledge graph of cybersecurity countermeasure techniques. The goal of this pr...
Can Web Browsers be “Secure” as Required by Federal Cybersecurity Guidelines?
Blog Published: 07/28/2021
This blog was originally published by Ericom Software here.Written by Gerry Grealish, Ericom Software Chief Marketing Officer.The National Institute of Standards and Technology (NIST) issued its “Definition of Critical Software Under Executive Order,” one of the first items to be delivered in ...
3 Key DevSecOps Trends for 2021
Blog Published: 07/29/2021
This blog was originally published by Blue Hexagon here.Written by Saumitra Das, Blue Hexagon.DevSecOps is a term that means different things to different people. I see it as primarily as an umbrella term for “continuous security” or security that is built into the process of building, shippin...
Bad guys are watching for new openings in your cloud, are you?
Blog Published: 07/30/2021
This blog was originally published by Sysdig here.Written by Janet Matsuda, Sysdig CMO.You see the headlines, and perhaps, ‘thank goodness it wasn’t us’ flickers through your mind. An overly permissive web server exposes 100 million+ consumer credit applications, or an S3 bucket leaves hundred...
You Can’t Detect What You Can’t See – In Real-Time. The Modern Cloud Security Edition
Blog Published: 08/06/2021
This blog was originally published by Blue Hexagon here.Written by Arun Raman, Blue Hexagon.There is an old maxim in cybersecurity: “You cannot detect what you cannot see.” While we hold the need for security visibility as a self-evident truth, there are implications for a cloud security archi...
Cloud Security Alliance Releases Guide to Facilitate Cloud Threat Modeling
Press Release Published: 07/29/2021
Document provides tangible exercise for organizations to create their own cloud threat modelSEATTLE – July 29, 2021 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications and best practices to help ensure a secure cloud computing e...
Secure Distributed Ledger Technology Framework for Financial Institutes
Blog Published: 08/03/2021
Last updated: February 25, 2022Distributed ledger technologies (DLT) introduce a multitude of value propositions for the financial services industry. The pace of innovation is aggressively picking up in use cases pertaining to finance such as digital assets, tokenization and cryptocurrency. Ho...
An Evolving Healthcare Cybersecurity Landscape
Blog Published: 07/30/2021
Cloud computing is still in its infancy in the healthcare industry, an industry that started experimenting with technology in the 1950s. But the pace of adoption is projected to continue to increase. With clinicians using mobility tools and the Internet of Things, the healthcare industry is co...
Three Network Weaknesses that Zero Trust Addresses
Blog Published: 08/04/2021
Zero Trust is a network security concept that aims to protect enterprise assets. Under Zero Trust, organizations should not automatically trust anything inside or outside traditional perimeters. Before granting access to assets, organizations should require the verification of anything and eve...
SECtember 2021: Why I’ll Be There
Blog Published: 08/03/2021
Written by Larry Hughes, Principal Compliance Consultant, LJH Compliance ConsultingI first got involved in the Seattle information security scene in 1996. I was busy building a security consulting practice for a startup. It wasn’t long before I met this affable fellow named Jim Reavis, who had...