Cloud 101CircleEventsBlog

All Articles

All Articles
When Ransomware and Your Data Move to the Cloud, How to Strengthen Protection

Blog Published: 03/29/2022

Written by ShardSecure Ransomware has been a serious threat for quite some time. But over the last two years it has captured the lion’s share of attention from enterprises, government agencies, and law enforcement as it now presents an increased globalized threat. A February 9, 2022, alert from ...

Anchore to Contribute Grype Open Source Vulnerability Data to the Global Security Database

Press Release Published: 03/29/2022

Contribution of Grype vulnerability data will advance software vulnerability intelligence and empower users of the Global Security Database to create secure softwareSEATTLE - March 29, 2022 - Today the Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards...

When It Comes to SaaS Security, Ignorance is Not Bliss for Corporate Leadership

Blog Published: 03/29/2022

Written by Brendan O’Connor, CEO and Co-Founder of AppOmni Organizations are increasingly moving their data to SaaS platforms. But while companies are racing to adopt SaaS, many haven’t yet put the tools and processes in place to protect their SaaS data, leaving it vulnerable in the cloud. It...

Kubernetes for Beginners – A Step-by-Step Guide

Blog Published: 03/28/2022

This blog was originally published by Vulcan Cyber here. Written by Natalie Kriheli, Vulcan Cyber. For beginners, Kubernetes can seem pretty daunting. It offers a feature-rich, flexible, and extensible platform, but the downside is that Kubernetes security can be quite challenging. Any misconfigu...

Data Discovery: A Means to an End or an End to a Means?

Blog Published: 03/28/2022

This blog was originally published by BigID here. Written by Alan Dayley, BigID. When it comes to data management and data governance, “data discovery” has historically been a vague term. Is it simply the ability to connect and create an inventory of an enterprise’s data assets — or is there more...

7 Technology Innovations That Will Impact Cybersecurity in 2022 and Beyond

Blog Published: 03/27/2022

Cloud has become the foundation for launching new technologies. As these new technologies are developed and adopted by enterprises, they will increasingly impact cybersecurity. Help our industry start preparing for the future by informing yourself of the top emerging technologies to watch for.Vie...

Amazon Ring: A Case of Data Security and Privacy

Blog Published: 03/26/2022

This case study is based off of CSA’s Top Threats to Cloud Computing: Egregious Eleven Deep Dive. The Deep Dive connects the dots between CSA Top Threats through the use of nine real-world attacks and breaches. Pulling from one of the case studies, this article provides a security analysis overvi...

Hey You, Get Out of My Cloud!

Blog Published: 03/25/2022

Written by Jim Mandelbaum, Gigamon Field CTO When we take a cloud solution to production how do we know who has access to that data? The process of deploying the production environment has certainly involved several groups and individuals. Who still has access and what can they do with it? Ho...

Cyber Attacks in Russia’s Invasion of Ukraine

Blog Published: 03/25/2022

This blog was originally published by Orca Security on March 11, 2022. Written by Bar Kaduri, Orca Security. The modern internet has drastically changed the landscape of threats. It created a new dimension where countries and individuals can affect, disrupt and demolish systems that comprise our ...

Cloud and Sovereignty: Are They Compatible?

Blog Published: 03/24/2022

This blog was originally published by Atos here. Written by Frederic Malicki, Pierre Brun-Murol, and Dominique Michiels. In a period where moving to cloud and sovereignty are becoming central for many companies and institutions — especially in Europe — let’s take a moment to examine the apparent ...

Adopting AI-based Attack Detection

Blog Published: 03/24/2022

This blog was originally published by LogicHub here. Written by Willy Leichter, Chief Marketing Officer, LogicHub. The security industry is long-overdue for real innovation with the practical application of emerging technologies around automation, machine learning, and artificial intelligence for...

Ownership, Control and Possession – Options for Key Management in the Cloud

Blog Published: 03/24/2022

This blog was originally published by Entrust here. By Iain Beveridge, Senior Product Marketing Manager, Data Protection Solutions at Entrust. My favourite scene from mid-80’s movie Ferris Bueller’s Day Off, was when Ferris (Matthew Broderick) and his friends roll into a rather shady looking va...

Financial Sector and Cloud Security Providers Complete Initiative To Enhance Cybersecurity

Press Release Published: 03/23/2022

A joint trade initiative identifies roles and responsibilities between firms and cloud security providers, establishing a mutually beneficial framework for cybersecurity.Seattle —The Cyber Risk Institute (CRI), the Cloud Security Alliance (CSA), and the Bank Policy Institute-BITS announced today ...

The Debate: Should You Build or Buy CAASM?

Blog Published: 03/23/2022

This blog was originally published by JupiterOne here. Written by Jasmine Henry, JupiterOne. Should you build or buy a CAASM solution? It’s a valid question, especially in an ecosystem rich with open source and low-cost security tools. You don’t need enterprise software to create API integrations...

To Err is Human, and That is What Hackers are Counting On

Blog Published: 03/23/2022

Originally published January 20, 2022 on Fugue’s website. Written by Josh Stella. Read the first blog in this series here. It’s understandable if you’ve made thwarting ransomware your top cybersecurity priority for 2022. The number of successful ransomware attacks, which encrypt computers unt...

Data Breach vs Data Exposure

Blog Published: 03/22/2022

This blog was originally published by TokenEx here. Written by Anni Burchfiel, TokenEx. Data breaches have become increasingly common, and costly, as the world continues to work from home. According to CyberTalk in 2021, 36 billion company records were exposed, and data breach costs soared to $4....

The Top 22 Digital Transformation Trends To Look Out For In 2022

Blog Published: 03/22/2022

This blog was originally published by Contino here. Written by Deepak Ramchandani, Contino. 2021 was a big year in the world of digital transformation. The pandemic continued to push businesses to accelerate their digital journeys. From data-driven sustainability initiatives to cloud-first remote...

Five Cloud Security Traps (And How to Avoid Them)

Blog Published: 03/21/2022

This blog was originally published by Vulcan Cyber here. Written by Gal Gonen, Vulcan Cyber. It’s no surprise that one of the biggest concerns for companies using the cloud – whether they were born in the cloud or migrated to one – is the attached security management, specifically when “operating...

Your Data Is Everywhere: Here Are The Critical Capabilities Of A Modern Data Loss Prevention (DLP)

Blog Published: 03/21/2022

This blog was originally published by Lookout here. Written by Sundaram Lakshmanan, CTO of SASE Products, Lookout. In some ways, IT teams had a great life in the early 2000s. Data was stored inside data centers and accessed through known ingress and egress points like a castle with a limited numb...

The CSA Triangle Chapter Supports Veterans and Grows Talent in the Triangle

Blog Published: 03/20/2022

The Cloud Security Alliance Triangle Chapter began as a grassroots initiative in 2018 when Eric Hart recognized the need for advancing the mission of cloud security in the Triangle (Raleigh, Durham, Chapel Hill) area of North Carolina.Eric recognized the potential when meeting with Kyle Mitchell ...

Looking for the CCM?

Start using the Cloud Controls Matrix to simplify compliance with multiple standards & regulations.