Cloud 101CircleEventsBlog

All Articles

All Articles
PCI DSS Version 4.0: Managing Your Scope for “Significant Change”

Blog Published: 05/24/2022

This blog was originally published by PKWARE here. Written by Marc Punzirudu, Field CTO, PKWARE. After a few delays, PCI DSS version 4.0 was finally announced publicly on March 31, 2022. While entities may still use PCI DSS v3.2.1 until its retirement date on March 31, 2024, there are some notabl...

Bad Luck: BlackCat Ransomware Bulletin

Blog Published: 05/24/2022

This blog was originally published by LogicHub here.Blackcat RansomwareOn April 19th of 2022, the FBI Cyber Division released a flash bulletin regarding the Blackcat ransomware-for-hire. This was met with mixed reactions - some found the ransomware to be of little concern, others made a case for ...

What Is Payment Orchestration?

Blog Published: 05/24/2022

This blog was originally published by TokenEx here.Written by Valerie Hare, Content Marketing Specialist at TokenEx.The Payment Orchestration for Global Commerce indicates that the global market for payment orchestration platforms (POPs) is expected to grow by 20 percent each year from 2021 to 20...

Secure Software Supply Chain: Why Every Link Matters

Blog Published: 05/23/2022

This blog was originally published by Sysdig here. Written by Álvaro Iradier, Sysdig. The new threats in software development are not only related to the specific company itself. The whole software supply chain is a target for attackers and it is really important to make sure that we put all our ...

Getting Started with Kubernetes Ingress

Blog Published: 05/23/2022

This blog was originally published by ARMO here. Written by Ben Hirschberg, VP R&D & Co-founder, ARMO. Kubernetes Ingress is one of today’s most important Kubernetes resources. First introduced in 2015, it achieved GA status in 2020. Its goal is to simplify and secure the routing mechanis...

Understanding the Updates to Risk Management in PCI DSS v4.0

Blog Published: 05/23/2022

This blog was originally published by Schellman here. Written by David Moody, Schellman. Formula One legend Ayrton Senna once said this about racing: “I don't know driving in another way which isn't risky. Each driver has its limit. My limit is a little bit further than others.” It’s safe to sa...

Types of IoT Cyber Risks

Blog Published: 05/20/2022

This blog was originally published by Agio here. The Internet of Things (IoT) has given us loads of valuable new devices, but it’s also created a new kind of security risk for organizations. Many people don’t see the danger posed by something as simple as a smart thermostat or lightbulb. So how d...

Know Your Cloud Security Acronyms: CWPP, CSPM, CIEM and CNAPP

Blog Published: 05/20/2022

This blog was originally published by Orca Security here. Acronyms help communicate lengthy phrases, but they can sometimes be confusing. This is especially true in the security industry, which has an alphabet soup of acronyms that can make even seasoned practitioners feel lost.One of the new acr...

CISO to CISO: 3 Practical Tips to Protect Your Data in the Cloud

Blog Published: 05/20/2022

Written by Marc Blackmer, ShardSecure. The explosion of remote work over the last two years has driven the rapid adoption of cloud services and, with that, a rise in threats and risk to enterprise data. Now that we know a hybrid work model is here to stay, organizations need to better understand ...

The One Cloud Threat Everyone Is Missing

Blog Published: 05/19/2022

Blog originally published at fugue.co on April 22, 2022. Written by Josh Stella, Chief Architect at Snyk. Ask security professionals to name the biggest threat to their organizations’ cloud environments, and most won’t hesitate to give a one-word answer: misconfigurations. Technically, t...

Cloud Security Alliance Provides C-level Executives With Best Practices for Deploying Smart Contracts Within an Organization

Press Release Published: 05/19/2022

Stakeholders will gain deeper understanding of the many legal, regulatory, and security considerations that arise when using smart contractsSEATTLE – May 19, 2022 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and best practi...

Threats of Russia Cyber Attacks Following Invasion of Ukraine

Blog Published: 05/19/2022

This blog was originally published by BlueVoyant here.In the wake of Russia’s invasion of Ukraine, cyber experts predicted a surge in cyber activity. While BlueVoyant has observed an increase in reported adversarial activity associated with Russia-based threat actors, cyber attacks to date are mo...

Prioritizing Cloud Security Threats: What You Need to Know

Blog Published: 05/18/2022

This blog was originally published by Vulcan Cyber here. Written by Roy Horev, Vulcan Cyber Co-founder and CTO. As enterprises across the globe continue to leverage cloud technologies in order to improve business efficiency, cloud service providers (CSPs) looking to gain a competitive edge are ex...

Registration Now Open for CxO Trust Summit at Cloud Security Alliance SECtember

Press Release Published: 05/18/2022

Exclusive event to feature keynote presentations, networking opportunities, panel discussions, participation in three-phase attack scenarioSEATTLE – May 18, 2022 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications and best practice...

Introducing Data Security Posture Management (DSPM) Platform

Blog Published: 05/18/2022

This blog was originally published by Polar Security here. Written by Nimrod Iny, Polar Security. You’re a cloud-based company, your entire business model relies on cloud data and your cloud environment is VERY precious to you, correct? That’s why you invest all of your resources into protecting ...

Breaking The Chain: Are You The Unintended Victim Of A Supply Chain Attack?

Blog Published: 05/17/2022

This blog was originally published by Lookout here. Written by Hank Schless, Senior Manager, Security Solutions, Lookout. We’ve heard a lot about “supply chains” of various industries over the past couple of years, and the cybersecurity sector is no exception. When Colonial Pipeline was comprom...

Threat Activity Cluster #1: Mint

Blog Published: 05/17/2022

This blog was originally published by Alert Logic on March 22, 2022. Written by Josh Davies and Gareth Protheroe, Alert Logic. Before diving into this first Ice Cream activity cluster, be sure to read the series introduction here. Our first activity cluster is known as Mint. This is a flavor ...

Cloud Security Alliance Issues Guide to Utilizing High Performance Computing

Press Release Published: 05/17/2022

Report provides a starting point for the proper selection, design, and implementation of an HPC solutionSEATTLE – May 17, 2022 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud co...

How to Architect for Sustainability in a Cloud Native Environment

Blog Published: 05/16/2022

This blog was originally published by Contino here. Written by Scott McCracken, Contino. Recognising the impact we have on the environment is more important than ever and ensuring our businesses are sustainable is now paramount. Over the last year, more and more organisations have signed up to Th...

Basic Principles in Designing an Education and Upskilling Strategy

Blog Published: 05/16/2022

This blog was originally published by CXO REvolutionaries here. Written by Greg Simpson, Chief Technology Officer (retired), Synchrony.One of the oldest cliches about business is that the only constant is change. And while we’ve all heard that one too many times, it is, like many cliches, fundame...

Looking for the CCM?

Start using the Cloud Controls Matrix to simplify compliance with multiple standards & regulations.