DNS-Layer Security: The Ultimate Guide to What It Is and Why You Need It
Blog Published: 12/09/2021
Originally Published by Cisco on March 10, 2020. Written by Lorraine Bellon, Cisco. If you’re like most people, you probably don’t pay much attention to the domain name system (DNS) or worry about investing in cloud-based DNS-layer security. After all, the hallmark of well-functioning DNS serv...
Compliance: Cybersecurity Assurance OR How to Gain the Trust of Your Business Partners
Blog Published: 12/09/2021
By Mustapha Berrabaa – CTO at Fortica Information security is a concern for all organizations, including those that outsource key business operations to third-party vendors (examples: SaaS, cloud service providers). Poorly managed data can expose companies to attacks such as data theft, e...
How to Adhere to the AWS Well Architected Framework
Blog Published: 12/10/2021
Originally Published on Fugue’s Website on November 24, 2021 By Becki Lee, Senior Technical Writer The Amazon Web Services Well-Architected Framework is a set of recommendations AWS provides for designing infrastructure for cloud applications and workloads. By following the guidance in t...
Cloud Applications Put Your Data at Risk. Here's How to Regain Control
Blog Published: 12/10/2021
Written by Yaki Faitelson, Co-Founder and CEO of Varonis. Cloud applications boost productivity and ease collaboration. But when it comes to keeping your organization safe from cyberattacks, they're also a big, growing risk. Your data is in more places than ever before. It lives in sanction...
Cloud Security Alliance Releases New Cloud Controls Matrix Auditing Guidelines
Press Release Published: 12/08/2021
Document provides auditors a baseline understanding of the CCM audit areas, allowing them to better perform a CCM-related audit and assessmentSEATTLE – Dec. 8, 2021 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and best p...
The Past, Present, and Future of Zero Trust
Blog Published: 12/12/2021
There has been a lot of discussion on the topic of Zero Trust (ZT). CSA has been involved in the realm of ZT since 2013, via the Software Defined Perimeter Working Group (now known as the SDP and Zero Trust Working Group). The first SDP Specification was published in 2014, encompassing the pri...
The CFO and Cloud Adoption: 101
Blog Published: 12/13/2021
Introduction to the Cloud I always find it interesting to ask people where their organization is at on their cloud journey. Everyone reading this post already has some cloud presence, but one question is where are you on this path to cloud adoption? The immediate follow-up to the first ques...
HTML Smuggling Evades Traditional Cybersecurity Solutions
Blog Published: 12/13/2021
This blog was originally published by ZTEdge here. Written by Nick Kael, Chief Technology Officer, ZTEdge. Microsoft’s 365 Defender Threat Intelligence Team recently issued a warning about a worrying increase in HTML smuggling attacks, in which hackers “smuggle” encoded malicious script via ...
Blockchain Security and Legaltech
Blog Published: 12/14/2021
Written by Sebastian Soriano, TRATO Since its inception, the blockchain technology has shown promising application prospects. With the rise of technology many industry players are now digitizing and integrating new technologies to ensure cybersecurity in transactions. Among all solutions...
Rethinking the Complex Economics of Cloud
Blog Published: 12/14/2021
This blog was originally published by Booz Allen here. Written by Dan Tucker, Booz Allen. How to optimize cloud for enterprise valueIT and mission leaders often spend numerous budget planning cycles weighing the economics of on-premises versus cloud operations, and that’s completely understand...
DevOps Security Tools for Enterprise DevSecOps Teams
Blog Published: 12/15/2021
This blog was originally published by Vulcan Cyber here. Written by Rhett Glauser, Vulcan Cyber. DevOps has revolutionized the pace at which new iterations of applications are released to meet the needs of customers. By nature, security teams are focused on securing company assets and data, wh...
What if We Saw an End to Alert Fatigue?
Blog Published: 12/16/2021
This blog was originally published by Secberus here. Written by Fausto Lendeborg, Secberus. When a violation occurs, the alert isn’t a warning to investigate, it’s a warning to remediate. The challenge is knowing which alerts are the true violations. Enterprises should be less concerned wi...
How Legacy AST Tools Fail to Secure Cloud Native Applications
Blog Published: 12/17/2021
Written by Ron Vider, Co-Founder & CTO of Oxeye Organizations worldwide are building and deploying cloud native applications, where the architecture is quite different from yesterday’s monolithic counterparts. What used to be a custom code block installed on a single bare metal server ...
The Pros and Cons of Using SaaS Security Services
Blog Published: 12/11/2021
Written by the Security Guidance Working GroupIn this blog we discuss the benefits and concerns of security services delivered from the cloud. These services, which are typically SaaS or PaaS, aren’t necessarily used exclusively to protect cloud deployments; they are just as likely to help def...
Evolving Zero Trust—Lessons Learned and Emerging Trends
Blog Published: 12/15/2021
This blog was originally published by Microsoft on November 3, 2021. Written by Alex Weinert, Director of Identity Security, Microsoft. Looking back at the last two years, to say that our security strategies have evolved would be an understatement. Organizations around the world made over...
What Did We Learn About Cyber Risk Management in 2021?
Blog Published: 12/17/2021
By Bob Maley, Chief Security Officer at Black Kite “The more things change, the more they stay the same.” Author Jean-Baptiste Alphonse Karr wrote this in 1849 and it still rings true today, especially in cybersecurity. The number of reported data breaches in 2021 have soared past the total fo...
Zero Trust in the Spotlight at SECtember 2021
Blog Published: 12/18/2021
This past September, CSA hosted SECtember 2021, the premier cloud security conference that features the best cloud security minds in the industry. If you missed it in person, we’ve got you covered. In our first recap blog, we discussed the presentations from the three keynote speakers at the e...
Top Tips for Ransomware Defense
Blog Published: 12/20/2021
This blog was originally published by Cisco here. Written by Angela Frechette Cannon, Cisco. Ransomware is wreaking havoc. What can we do?Ransomware is making its way outside the cybersecurity space. It’s popping up everywhere from the nightly news to the G7 Summit. Indeed ransomware has enter...
Capital One Breach: Is Your AWS Environment Just as Susceptible?
Blog Published: 12/20/2021
This blog was originally published on August 9, 2019 by JupiterOne. The Opportunity for Security Teams It’s been a little over a week since the coverage of the Capital One data breach. The impact of 100 million plus records that were compromised breathed gasoline onto the fiery debate as t...
How to Use Kubernetes Audit Logs to Identify Potential Security Issues
Blog Published: 12/21/2021
This blog was originally published by ARMO here. Written by Amir Kaushansky, ARMO. Audit logging involves recording transactions and system events, making it an invaluable tool for regulatory compliance, digital forensics, and information security. In a typical Kubernetes ecosystem, auditing i...