Cloud 101CircleEventsBlog

All Articles

All Articles
Security Performance Reporting

Blog Published: 04/20/2022

Command guidance for CISO-to-stakeholder communications Written by John Hellickson, Field CISO, Coalfire There is tremendous urgency for security professionals to do a better job at communicating security program performance to enterprise stakeholders and boards of directors. For the Coalfire ...

Cloud Security Alliance Paper Offers Executive Management Guidance on Factors to Consider When Implementing Serverless Architectures

Press Release Published: 04/20/2022

Report reviews risks, security concerns that accompany serverless architecture and offers industry-wide security best practices for adoptionSEATTLE – April 20, 2022 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and best prac...

Weathering Russian Winter: The Current State of Russian APTs

Blog Published: 04/20/2022

This blog was originally published by LogicHub on April 8, 2022. Written by Tessa Mishoe, Senior Threat Analyst, LogicHub. Russian Advanced Persistent Threats (APTs)It’s no secret that Russian Advanced Persistent Threats (APTs) are a significant burden on cybersecurity teams. For years, organizat...

Crypto Caper: How Cybercriminals Steal Crypto from Blockchain Networks

Blog Published: 04/19/2022

This blog was originally published by TokenEx here. Written by Valerie Hare, TokenEx. In 2009, the first established cryptocurrency was born – Bitcoin. If you aren't familiar with cryptocurrency, it's an online currency with ledgers secured by encryption. Since those early years, digital currency...

What the Businesses at Work Report Means for Your SaaS Security Program

Blog Published: 04/18/2022

This blog was originally published on February 22, 2022 by DoControl. Written by Corey O'Connor, DoControl. Earlier this month, Identity and access management platform leader Okta published their 8th annual “Businesses at Work” report. The report pulls data from their more than 14,000 global cust...

Network Intelligence: Required Information and Insights in This Digital Era

Blog Published: 04/18/2022

This blog was originally published by Gigamon here. Written by Mark Leary, IDC Research Director, Network Analytics and Automation. For more, read Part 1 of this series.In my previous guest blog, “Your Network and Their Cloud: Less Visibility. More Vulnerabilities,” I focused on the rising challe...

6 SDP Deployment Models to Achieve Zero Trust

Blog Published: 04/16/2022

Written by the SDP and Zero Trust Working GroupWith Software Defined Perimeter (SDP), enterprises can move away from traditional (and largely ineffective) perimeter-centric models, achieving the goals of Zero Trust and therefore improving their security effectiveness and resiliency. SDPs replace ...

Cyber Protection Week 2022: The Need (And Demand) For Integration Grows

Blog Published: 04/15/2022

This blog was originally published on March 31, 2022 by Acronis. Written by Dave Kostos, Acronis. For a long time, March 31 was World Backup Day: an annual event created to raise awareness of the importance of backup best practices. In 2020, we celebrated the final World Backup Day and, with a vi...

The Dangers of Exposed Elasticsearch Instances

Blog Published: 04/15/2022

This blog was originally published by Open Raven here. Written by Michael Ness, Open Raven. Elasticsearch is a widely used text-search and analytics engine. The tooling provides a simple solution to quickly, easily, and efficiently store and search large volumes of data. Elasticsearch is utilized...

Why You Need Application Security Testing for Business-Critical Applications

Blog Published: 04/14/2022

This blog was originally published by Onapsis here. This blog is about the importance of building secure business-critical applications with application security testing. While many organizations employ defense-in-depth security models to protect their critical systems, not enough consideration i...

Now, More Than Ever, Mentorship Matters in Cybersecurity

Blog Published: 04/14/2022

This blog was originally published by CXO REvolutionaries here. Written by Kavitha Mariappan, EVP, Customer Experience and Transformation, Zscaler. Twin trends unfolding within cybersecurity are making mentorship relationships more critical than ever. On the one hand, an increasingly digitized wo...

SANS Cloud Security Survey 2022 – Highlights

Blog Published: 04/14/2022

This blog was originally published by Vulcan Cyber here. Written by Orani Amroussi, Vulcan Cyber. In 2022, security issues have increased in cloud assets, leading to more data breaches involving cloud environments. But, despite the growing threats and attached cyber risk, organizations are undete...

Pentests Often Miss 6 Critical SaaS Security Issues. Here’s Why.

Blog Published: 04/13/2022

This blog was originally published by AppOmni here. Written by Tim Bach, Vice President of Engineering, AppOmni. As security and compliance teams assess the fallout and lessons learned from data breaches, they’ll need to re-evaluate their security practices and controls. This is particularly ...

New Cloud Security Alliance Paper Explores How Enterprises Can Augment, Integrate DNS Systems with Software-Defined Perimeter (SDP) to Enhance Security

Press Release Published: 04/13/2022

Security visibility, resiliency, and responsiveness can be improved by combining Domain Name Systems and enterprise-managed DDI systems with SDPSEATTLE – April 13, 2022 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and best ...

Governing the Organization

Blog Published: 04/13/2022

This blog was originally published by Coalfire here. Written by Matt Klein, Field CISO, Coalfire. Security is the biggest risk to business today. Managing security has become one of the hardest jobs in the enterprise, and failing to do so effectively can create opportunities for severe operationa...

The Evolution from SIEM to AI Driven Automation

Blog Published: 04/12/2022

This blog was originally published by LogicHub here. Written by Kumar Saurabh, LogicHub. Kumar Saurabh, LogicHub CEO and Co-founder, discusses his experience in the SIEM space and what he sees as the natural evolution from SIEM technology to AI and automation driven detection and response.The Ear...

Cyber Readiness and the Russia-Ukraine War

Blog Published: 04/12/2022

This blog was originally published on March 10, 2022 by Lookout. Written by Hank Schless, Senior Manager, Security Solutions, Lookout. I was encouraged when I saw our partners over at Microsoft step in when Russian cyberattacks commenced alongside their invasion of the Ukraine. While there ...

New Cloud Security Alliance Survey Finds SaaS Misconfigurations May Be Responsible for Up to 63 Percent of Security Incidents

Press Release Published: 04/12/2022

Proper visibility into SaaS security application settings and automated tools can mitigate risk SEATTLE – April 12, 2022 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computin...

20 DevSecOps Best Practices Across People, Process and Technology

Blog Published: 04/12/2022

This blog was originally published by Contino here. Written by Marcus Maxwell, Contino. How can secure software be developed at speed and scale!?This is the ultimate IT paradox for modern global enterprise organisations: go faster and innovate. But always stay secure.DevSecOps is the answer to in...

Put Your Trust in the Stack

Blog Published: 04/11/2022

This blog was originally published by Entrust here. Written by Wayne Lewandowski, Vice President of Sales, Entrust Data Protection Solutions. Breaches, infiltration, exfiltration, compromised privileges, and interrupted access to critical systems are all parts of a well-written espionage movie, o...

Looking for the CCM?

Start using the Cloud Controls Matrix to simplify compliance with multiple standards & regulations.