How Do You Secure Your Cloud Services?
Blog Published: 10/01/2021
This blog was originally published by Alert Logic here. In a previous post – What are the Most Common Cloud Computing Service Delivery Models? – we broke down the benefits of each: Software as a Service (SaaS)Infrastructure as a Service (IaaS)Platform as a Service (PaaS) Consider...
Latest Paper from Cloud Security Alliance Examines Top 10 Blockchain Attacks, Vulnerabilities, and Weaknesses
Press Release Published: 09/28/2021
In the last five years, 43 exchanges have been publicly hacked, and more than 49 Decentralized Finance protocols have been exploited, resulting in a loss of more than $2.8 billionSEATTLE – Sept. 28, 2021 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to definin...
Cloud Security Alliance Announces Partnership with The Demo Forum
Press Release Published: 09/28/2021
SEATTLE – Sept. 28, 2021 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment, today announced a collaboration with The Demo Forum, an analyst-hosted, video ...
What if On-Prem Cloud Strategy Relied on Policy-as-Code Rather Than Taking Inventory?
Blog Published: 10/06/2021
This blog was originally published by Secberus here. Let's focus on creating cloud security policies that govern hybrid environments. Fausto Lendeborg, CEO of Secberus, and Everett Young, COO, spend a lot of their time talking about the future of cloud governance. And the rest of their time na...
How To Fix Vulnerabilities Regularly And Block DDoS Attacks
Blog Published: 10/04/2021
This blog was originally published by MazeBolt here. In cybersecurity, a vulnerability is a weakness in a computer system or a network, making it susceptible to a cyberattack. Attackers exploit network vulnerabilities when they launch DDoS attacks that cause the target system or service to cr...
Top Vulnerability Assessment and Management Best Practices
Blog Published: 10/05/2021
This blog was originally published by Sysdig here. Written by Víctor Jiménez Cerrada, Sysdig. Vulnerability assessment and vulnerability management practices are critical to minimizing the exposure and attack surface of your whole infrastructure. We’re human, and many things we build aren't pe...
Four Ways Automation Can Transform Your Third-Party Cyber Risk Management Strategy
Blog Published: 10/07/2021
This blog was originally published by Black Kite here. Supply chains are growing at an annual rate of 11.2% and are forecasted to double in size by 2026. Growing supply chains inherently pose greater supply chain risk and require a scalable approach to vendor risk management. Cyber risk monito...
Why Phishing is a Bigger Threat than Ransomware
Blog Published: 10/08/2021
This blog was originally published by Bitglass here. Written by Jonathan Andresen, Bitglass. While enterprise security teams have had their hands full battling an increasing number of more sophisticated ransomware attacks, phishing attacks are on the rise with the easing of pandemic-related re...
Why You Should Publish Your Security Posture Publicly
Blog Published: 10/12/2021
Written by Whistic Over the past decade or so, the way InfoSec teams manage data security and privacy standards has changed dramatically. From managing on-premises hardware security access to the online-driven security efforts of a decade ago, things have become more and more flexible. Today, ...
Lessons from Our Journey to Obtain Our SOC 2 Report and ISO Certifications
Blog Published: 10/13/2021
This blog was originally published by Grammarly here.Written by Andrew Derevyanko, Director of Engineering, GrammarlyIn June 2021, Grammarly achieved a new security and compliance milestone. We received our SOC 2 (Type 2) and SOC 3 reports as well as three certifications from the International...
How to Protect Your Cloud Environment from Supply Chain Attacks
Blog Published: 10/14/2021
This blog was originally published by Wiz here. Written by Josh Dreyfuss, Wiz. Recently, the Wiz research team hosted a webinar titled “How to Protect Your Cloud Environment from Supply Chain Attacks.” In this post, we’ll share a recap of what the team covered. To start with, just a quick look...
CCSK Success Stories: From a Managed Service Engineer
Blog Published: 10/15/2021
This is part of a blog series interviewing cybersecurity professionals who have earned their Certificate of Cloud Security Knowledge (CCSK). In these blogs we invite individuals to share some of the challenges they face in managing security for cloud computing and how they were able to leverag...
The Benefits of the CFO Obtaining the CCAK
Blog Published: 10/13/2021
What is the CCAK? The Cloud Security Alliance (CSA), in conjunction with ISACA, released the CCAK (Certificate of Cloud Auditing Knowledge) earlier this year. As the CFO of CSA, I previously obtained my CCSK (Certificate of Cloud Security Knowledge), the predecessor to the CCAK, as did the r...
CISO DDoS Handbook - The DDoS Threat to Digital Transformation
Blog Published: 10/18/2021
This blog was originally published by MazeBolt here. Written by Yotam Alon, MazeBolt. As the global economy and its reliance on technology continue to evolve, so do cyberattackers’ strategies and techniques - working on launching debilitating DDoS attacks with the intent to cause downtim...
Agents are Not Enough: Why Cloud Security Needs Agentless Deep Scanning
Blog Published: 10/20/2021
This blog was originally published by Wiz here. Written by Josh Dreyfuss, Wiz. Cloud environments are characterized by their dynamic nature. It’s easier than ever before to spin up new resources and add new technologies, which leads to an ever-increasing number of people and teams deploying in...
Runtime Protection, the Mindset Shift Cloud Security Needs
Blog Published: 10/21/2021
This blog was originally published by Virsec here. Written by Satya Gupta, Co-Founder and CTO, Virsec. For years, companies have adopted cloud infrastructure for ease and speed in deploying applications. However, over the past 18 months the move to the cloud has accelerated dramatically as...
Top Network Security Mistakes in AWS, and How to Fix Them
Blog Published: 10/18/2021
This blog was originally published by Valtix here. Written by Jigar Shah, Valtix. A Two-part Blog Series and Cloud Security Alliance Webinar In talking with end-user organizations, we’ve seen and heard lots of misconceptions and mistakes over the years – and even espoused a few ourselves. A...
New Cloud Security Alliance Guidance Provides Framework for Protecting Critical Healthcare Systems While Taking Risk to Patient Safety Into Account
Press Release Published: 11/09/2021
Paper from IoT Working Group highlights the importance of not treating medical device incident response as a one-size-fits-allSEATTLE – Nov. 9, 2021 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and best practices to help...
The 6 Phases of Data Security
Blog Published: 10/14/2021
The primary goal of information security is to protect the fundamental data that powers our systems and applications. As companies transition to cloud computing, the traditional methods of securing data are challenged by cloud-based architectures. You don’t have to lift and shift existing prob...
Security as Code is the Future to Governing Risk
Blog Published: 10/19/2021
This blog was originally published by Secberus here. Written by Fausto Lendeborg, Secberus. We read McKinsey’s Security as code: The best (and maybe only) path to securing cloud applications and systems in July and have not stopped discussing it. The big idea: “Managing security as c...