ChaptersCircleEventsBlog

All Articles

All Articles
MPA Best Practice Guidelines Name RBI as Implementation Guidance Infrastructure for Web Filtering and Usage Control

Blog Published: 08/27/2021

This blog was originally published by Ericom Software here.Written by Peter Fell, Group CTO, EME, Ericom Software. What Every TPN Vendor Should Know About Remote Browser Isolation In a recent important addition to the Motion Picture Association (MPA) Content Security Program, MPA Best Prac...

Cloud Security Alliance Welcomes Inaugural Members of the CxO Trust Advisory Council

Press Release Published: 08/24/2021

Members will contribute to, advise on the overall strategy and roadmap of CxO Trust and CxO Working GroupSEATTLE – Aug. 24, 2021 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure clo...

CSA CxO Trust Initiative: Understanding the Priorities of the C-Suite

Blog Published: 08/25/2021

CSA’s CxO Trust Initiative is a broad-based, forward-looking initiative to elevate the knowledge of cloud computing and cybersecurity. Its core mission is to help Chief Information Security Officers (CISOs) better understand the priorities of their peers within the C-Suite and effectively comm...

What is the MITRE ATT&CK Framework for Cloud? | 10 TTPs You Should Know Of

Blog Published: 08/26/2021

This blog was originally published by Sysdig here.Written by Stefano Chierici, Sysdig.MITRE ATT&CK framework for cloud will help you identify the possible threats related to a cloud environment and begin securing your cloud infrastructure.MITRE ATT&CK is a well-known comprehensive know...

What is CAIQ?

Blog Published: 09/01/2021

CCM, STAR, CCSK, CCAK – the Cloud Security Alliance is rolling in acronyms that you might not be familiar with yet. In this post, we’re going to get you up to speed on one of our most useful tools for cloud security transparency: CAIQ.A Questionnaire for Transparency and AssuranceCAIQ is an ac...

The Microservices Architecture Pattern: Expanding Security Assurance Ideas in Containers and Microservices

Blog Published: 09/02/2021

After 137 rolling discussions on Circle and growing a library of input material to 42 unique documents, 2 co-chairs and 343 Application Containers and Microservices (ACM) working group members spanning 5 continents created a third installment further expanding the ideas of CSA security assuran...

Cloud Security Alliance Releases Guidance on Microservices Architectural Pattern for a Repeatable Approach to Architecting, Deploying Secure Systems

Press Release Published: 08/31/2021

Document designed to help application developers, architects develop a vendor-neutral reference architecture foundationSEATTLE – Aug. 31, 2021 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a se...

Here are Five Key Takeaways to Build a Best-in-Breed Security Architecture for Your Enterprise

Blog Published: 09/03/2021

Written by Fausto Lendeborg, CEO, Secberus.Secberus was invited to participate in Plug and Play’s (PnP) Partnerships Transforming Healthcare: Healthcare and the Cloud event. Our CEO, Fausto Lendeborg was accompanied by Edmond Mack, VP Security Architecture at GSK as well as Jennifer Thomas, Ma...

Detecting When Ransomware Moves Into Your Cloud

Blog Published: 09/09/2021

This blog was originally published on Vectra.ai With around 65,000 ransomware attacks expected this year in the US alone according to Yahoo! Finance, let’s just go out on limb here and say that folks are having a rough go at stopping these menacing occurrences. It doesn’t seem to matter whi...

The Future of DDoS Protection - Simulation Not Resilience!

Blog Published: 08/31/2021

This blog was originally published by MazeBolt here. Written by Yotam Alon, MazeBolt. Existing DDoS Protection Shortcomings As the word 'Resilient,' indicates, DDoS mitigation solutions do not prepare for attacks ahead of time, they adapt to and recover from DDoS attacks, after they have be...

Cloud Security Alliance Federal Summit 2021 Live Event to Focus on Building Trust and Security in the New Normal

Press Release Published: 09/01/2021

New Executive Order on Improving the Nation’s Cybersecurity will be among key topics of discussionSEATTLE – Sept. 1, 2021 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud comp...

Kubernetes 1.22 – What’s new?

Blog Published: 09/06/2021

This blog was originally published by Sysdig here. Written by Víctor Jiménez Cerrada, Sysdig. Kubernetes 1.22 was released in early August, and it comes packed with novelties! Where do we begin? This release brings 56 enhancements, an increase from 50 in Kubernetes 1.21 and 43 in Kubernetes...

If a SYN Flood Attacks Your Network Tomorrow – Would Your Mitigation Be Able to Block It?

Blog Published: 09/08/2021

This blog was originally published by MazeBolt here.Written by Vova Kamenker, MazeBolt.There are various DDoS vectors that cause networks to crash, resulting in downtime for enterprises. One of these vectors, a common one, is the SYN flood. As DDoS attackers continue to change and vary their s...

How Security Changes With Cloud Networking

Blog Published: 09/08/2021

Common on-premises network practices work differently for the cloud user and provider due to the lack of direct management of the underlying physical network. The most commonly used network security patterns rely on control of the physical communication paths and insertion of security applianc...

Six Pillars of DevSecOps Series

Blog Published: 09/09/2021

Last updated: March 24, 2025 While DevOps practices can help improve the management and operations of information security processes in an organization, the execution of these practices has to be secured. Security vulnerabilities can be inadvertently created due to lack of consideration of...

Are You On a Security Service Edge (SSE) Journey?

Blog Published: 09/10/2021

This blog was originally published by Bitglass here.Written by Mike Schuricht, Bitglass.Last month, in the latest Gartner “Hype Cycle for Network Security, 2021” by Shilpi Handa and Pete Shoard, Security Service Edge (SSE) was introduced. This segment was not only “High” on the Benefit scale a...

CCSK Success Stories: From a Cloud Technical Specialist

Blog Published: 09/13/2021

This is part of a blog series interviewing cybersecurity professionals who have earned their Certificate of Cloud Security Knowledge (CCSK). In these blogs we invite individuals to share some of the challenges they face in managing security for cloud computing and how they were able to leverag...

From CapEx to OpEx, and Greater Security

Blog Published: 09/13/2021

This blog was originally published by CyberCrypt here.In the cloud, cloud service providers (CSPs) manage the infrastructure they control—where organizational data and applications are stored—and perform the patching and updates so that the applications they use remain current.These advantages...

Coping With the Ransomware Threat

Blog Published: 09/14/2021

This blog was originally published by Oracle here.Written by Eric Maurice, Oracle.News of successful large-scale ransomware attacks are becoming more frequent. In some instances, companies considered part of the U.S. Critical Infrastructure have been compromised and their normal operations ha...

The Adoption of Multi-Cloud Drives the Need for Better Data Protection and Management of Encryption Keys and Policy Controls

Blog Published: 09/17/2021

This blog was originally published by Entrust here.Written by Jim DeLorenzo, Entrust.Enterprise adoption of multiple cloud platforms continues in earnest, whether it’s aimed at improving collaboration, reducing datacenter footprint, increasing customer response times or any number of other bus...

Looking for the CCM?

Start using the Cloud Controls Matrix to simplify compliance with multiple standards & regulations.