ChaptersCircleEventsBlog

All Articles

All Articles
Modern Cybersecurity: Book Preface

Blog Published: 11/04/2021

On October 19, 2021, JupiterOne published a book, "Modern Cybersecurity: Tales from the Near-Distant Future". This is an excerpt from the Preface. PrefaceCybersecurity is transforming. The last decade of cyberattacks, threat actors, and an endless stream of breached data was just a catnap comp...

Why Choose an MSSP

Blog Published: 11/04/2021

This blog was originally published by Cloudtango here. Written by Cloudtango. Since the pandemic, working from home has become widely adopted across all type of businesses around the globe. As the memory of the pandemic starts to progressively fade, many predict remote working will remain in o...

More on Targeted Attacks and How to Protect Against Them

Blog Published: 11/05/2021

Written by Alex Vakulov. Small and big organizations often face targeted attacks. APT (Advanced Persistent Threat) groups improve the quality of their operations, causing more serious damage. Timely detection and response, training of personnel, and advanced training of information security d...

Roberto Baldoni, Director General of the Italian National Cybersecurity Agency, and McAfee’s Raj Samani to Headline Cloud Security Alliance’s CISO Cloud Summit Italy 2021

Press Release Published: 10/28/2021

Event to offer two-day Certificate of Cloud Auditing Knowledge training sessionSEATTLE and MILAN, ITALY – Oct. 28, 2021 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud comput...

Business Continuity and Disaster Recovery in the Cloud

Blog Published: 10/31/2021

Business Continuity and Disaster Recovery (BC/DR) is just as important for cloud computing as it is for any other technology. However, specific considerations for the cloud need to be kept in mind. This blog will provide an overview of how to approach BC/DR in the cloud, including the overarch...

STAR Testimonial: The First Cloud-Specific Attestation Program

Blog Published: 10/30/2021

CSA’s STAR Attestation is the first cloud-specific attestation program designed to quickly assess and understand the types and rigor of security controls applied by cloud service providers. This is a collaboration between CSA and the AICPA to provide guidelines for CPAs to conduct SOC2 engagem...

Why Your Organization Needs Cyber Insurance

Blog Published: 11/05/2021

This blog was originally published by SafeBase here. Written by Kevin Qiu, Director of Information Security at SafeBase. Security Incidents Are Becoming Increasingly Expensive Cyber security products and defensive techniques have come a long way over the past few years as cloud computing ha...

5 Tips on How To Build a Great Cloud Migration Roadmap

Blog Published: 11/08/2021

Written by Susan Craig Just like any other complex project, cloud migration implies much more than just moving workloads. Its successful application allows companies to enhance the workflow, increase agility and boost the process's efficiency. Furthermore, that’s a great solution for setting u...

From the Trenches: 4 Cloud Security Lessons from Aon’s Chief Security Officer Anthony Belfiore

Blog Published: 11/08/2021

This blog was originally published by Wiz here. Written by Josh Dreyfuss, Wiz. Cloud has driven innovation and agility for organizations, but for security teams it has also brought new levels of complexity around people, processes, and technology. Today’s elastic cloud environments have i...

What Are the Security Challenges with BYOK for Hybrid Cloud Users?

Blog Published: 11/08/2021

This blog was originally published by Unbound Security here. Written by Lior Levy, Unbound Security. Refer to Unbound Security's webinar on November 18, 2021 for more information about key management and cryptography.Moving to the cloud usually brings several advantages, such as flexibility, s...

Security Spotlight: Critical Vulnerability Exploits and Patches, Plus Novel Attack Tactics

Blog Published: 11/09/2021

This blog was originally published by Bitglass here. Written by Jeff Birnbaum, Bitglass. Here are the top security stories from September 2021: Cisco Patches Three Critical Vulnerabilities Impacting Wireless Controllers and SD-WAN.Critical VMware vCenter Vulnerability Exploited in the WildNew ...

What is Gartner’s SASE Model, and How Will it Affect Your Cloud Security Stack?

Blog Published: 11/09/2021

By Chloe Whitaker Originally Published by Cisco on August 31, 2021 The way we think about networking and cybersecurity has changed dramatically in recent years. The rise of remote workers, coupled with the growing push of company data and infrastructure into the cloud, prompted Gartner to ou...

5 Best Practices to Reduce the Attack Surface in the Cloud

Blog Published: 11/10/2021

This blog was originally published by Virsec here. Written by Matt Ambroziak, Virsec. Over the last 18 months the cloud has gone mainstream. In case you need proof, Gartner forecasts end-user spending on public cloud services to grow 23.1% in 2021 to total $332.3 billion, up from $270 bill...

Making the Security Conversation More “Feature-Driven”

Blog Published: 11/10/2021

This blog was originally published by Adobe here. Written by Sandhya Narayan, Principal Program Manager, Adobe. A constantly changing security landscape driven by increasingly persistent threats, growing attack sophistication, and tighter compliance requirements keeps both security and prod...

Why Should Enterprises Move to a Zero-Trust Model?

Blog Published: 11/12/2021

This blog was originally published by Unbound Security here. Written by Lior Levy, Unbound Security. Refer to Unbound Security's webinar on November 18, 2021 for more information about the security of cryptographic keys, which is discussed later in this blog. The introduction of new norms such...

Einstein’s Wormhole: Capturing Outlook & Google Calendars via Salesforce Guest User Bug

Blog Published: 11/12/2021

This blog was originally published by Varonis here. Written by Nitay Bachrach, Varonis. If your organization uses Salesforce Communities and Einstein Activity Capture, you might have unknowingly exposed your administrator’s Outlook or Google calendar events to the internet due to a bug called ...

How the Incident Response Lifecycle Changes for Cloud

Blog Published: 11/13/2021

Incident Response (IR) is a critical facet of any information security system. Most organizations have some sort of IR plan to govern how they will investigate an attack, but as the cloud presents distinct differences in both access to forensic data and governance, organizations must consider ...

What is the Difference Between Software Defined Perimeter and Zero Trust?

Blog Published: 11/13/2021

Written by the CSA SDP and Zero Trust Working Group Summary: After reading this blog you’ll understand what Zero Trust is, the problems it helps solve, and the basics around what implementing Zero Trust looks like using SDP. What is Zero Trust? “Zero Trust” changes how network access works; as...

CCSK Success Stories: From a Manager of Cloud Infrastructure

Blog Published: 11/14/2021

This is part of a blog series interviewing cybersecurity professionals who have earned their Certificate of Cloud Security Knowledge (CCSK). In these blogs we invite individuals to share some of the challenges they face in managing security for cloud computing and how they were able to leverag...

3 Tenets For High-Performance Cloud Operations

Blog Published: 11/15/2021

This blog was originally published by Booz Allen here. Written by Osama Malik, Booz Allen Hamilton. Unlock enterprise resilience, scale, and flexibilityThese days, with technology progressing at a rapid, continuous, unrelenting clip, cloud capabilities offer federal agencies a way to achieve a...

Looking for the CCM?

Start using the Cloud Controls Matrix to simplify compliance with multiple standards & regulations.