Cloud Security Alliance Incorporates Strategy Domain into Scope of Certificate of Competence in Zero Trust (CCZT) Exam
Press Release Published: 08/27/2024
Addition ensures security professionals are best prepared to implement and manage their Zero Trust environmentsSEATTLE – Aug. 27, 2024 – To better equip professionals with the essential knowledge they need to understand and implement Zero Trust principles, the Cloud Security Alliance (CSA), the ...
Preparing for the End: PCI 4.0 Retirement in December 2024
Blog Published: 08/27/2024
Originally published by CyberGuard Compliance.Get ready for the upcoming retirement of PCI 4.0 on 31 December 2024. After this point, PCI DSS v4.0.1 will be the only active version of the standard supported by PCI SSCPreparing Your Business for the ChangeAs the retirement of PCI 4.0 approaches in...
How to Prepare for a SOC 2 Audit: 5 Tips from an Auditor
Blog Published: 08/26/2024
Originally published by BARR Advisory.Just like you’d map out an itinerary for an upcoming vacation or create a menu prior to a dinner party, preparing for your SOC 2 audit ahead of time can make the experience significantly smoother and more efficient. So how can you best prepare for the SOC 2 p...
Research Report: Internet-Connected Industrial Control Systems (Part One)
Blog Published: 08/26/2024
Originally published by Censys.IntroductionIn November 2023, the CyberAv3ngers, an Iranian Revolutionary Guard Corps-affiliated hacking group, compromised the Municipal Water Authority of Aliquippa, Pennsylvania. They targeted a water pressure monitoring system at a remote pumping station, exploi...
What is Offensive Security and Why is it So Challenging?
Blog Published: 08/23/2024
In cybersecurity, offensive security involves proactively simulating a cyber attacker’s behavior to identify system vulnerabilities. By understanding these potential vulnerabilities, organizations can then implement and enhance security controls to reduce the risk of exploitation by actual malici...
The New York Times GitHub Breach: What You Need to Know
Blog Published: 08/23/2024
Origially published by Suridata.Recently, the security landscape has been shaken by several high-profile breaches, and the latest incident involving GitHub tokens has once again highlighted the critical importance of Machine-to-Machine security practices. This blog dives deep into the details of ...
Securing the Future of HPC: Implementing Zero Trust and Strengthening Network Security
Blog Published: 08/23/2024
Written by CSA's High Performance Computing Working Group. High-Performance Computing (HPC) systems are pivotal in driving scientific research and innovation, offering computational power that exceeds conventional computing architectures. However, the complexity and scale of these systems introd...
Understanding the Differences Between Fully Homomorphic Encryption and Confidential Computing
Blog Published: 08/22/2024
Written by Ryan Gifford, Jez Goldstone, and Joseph Wilson.In the realm of data security and privacy, Fully Homomorphic Encryption (FHE) and Confidential Computing are two cutting-edge technologies that have garnered significant attention. While both aim to protect sensitive information, they do s...
PAM and Cloud Security: The Case for Zero Standing Privileges
Blog Published: 08/22/2024
Originally published by CyberArk.Written by Charles Chu. The cloud has introduced entirely new environments, roles and circumstances that require us to reimagine the definition of privileged access management (PAM) and how to apply those principles to secure identities. PAM was built on the no...
Colorado Artificial Intelligence Act Passes with Affirmative Defense Provision
Blog Published: 08/22/2024
Originally published by Truyo.In a groundbreaking move, Colorado is poised to become the pioneer state in regulating the use of high-risk artificial intelligence (AI) systems. The Colorado Artificial Intelligence Act (SB 205), recently passed by the state legislature, represents a significant ste...
Everything You Should Know About Continuous Controls Monitoring (CCM)
Blog Published: 08/21/2024
Originally published by Vanta.Continuous controls monitoring (CCM) is a crucial aspect of making GRC processes more automated, accurate, and actionable through technology. It helps organizations transition from inefficient point-in-time checks to automation-driven compliance controls that provide...
Building vs. Buying an ASPM Solution (And What We Can Learn from Raising Tamagotchis)
Blog Published: 08/21/2024
Originally published by Dazz.Let’s travel back in time to the mid ‘90’s, shall we?Tamagotchis—those adorable, electronic virtual pets—were introduced to the market in 1996 and absolutely exploded. In less than a year, Bandai had sold more than 10 million little e-critters, and to date, over 91 mi...
Driving AI Value in Security and Governance
Blog Published: 08/21/2024
Originally published by CXO REvolutionaries.Written by Rob Sloan, VP, Cybersecurity Advocacy, Zscaler.At Zscaler’s latest Women in Technology and Security CXO event at the RSA Conference in San Francisco, EVP of Customer Experience and Transformation, Kavitha Mariappan, hosted tech leaders to dis...
Top Threat #1 - Misconfig Misadventures: Taming the Change Control Chaos
Blog Published: 08/20/2024
Written by CSA’s Top Threats Working Group.In this blog series, we cover the key security challenges from CSA's Top Threats to Cloud Computing 2024. Drawing from insights of over 500 experts, we'll discuss the 11 top cybersecurity threats, their business impact, and how to tackle them. Whether yo...
How to Get the Most from Your Cloud Security Assessment
Blog Published: 08/20/2024
Originally published by Bell.Written by Jack Mann, Senior Technical Product Manager, Cyber Security, Bell. A cloud security assessment can provide great insight into how well you’re protecting your cloud-based data and workloads. However, the actual value of that assessment to your organization ...
Return of the RCE: Addressing the regreSSHion Vulnerability – CVE-2024-6378
Blog Published: 08/20/2024
Originally published by Pentera. A Regrettable Resurgence On July 1, 2024, the Qualys Threat Research Unit (TRU) published their discovery of an unauthenticated remote code execution (RCE) vulnerability in OpenSSH, a tool for secure remote connectivity using the Secure Shell (SSH) protocol. The b...
Avoiding Collapse in a Tech-Stacked World: How Staying Still Can Create Fragile Defences
Blog Published: 08/19/2024
Written by Vaibhav Dutta, Associate Vice President and Global Head-Cybersecurity Products & Practice, Tata Communications.Originally published on Frontier Enterprise.Ransomware activity alone was up 50% year-on-year during the first half of 2023. We have been seeing a relentless rise in the n...
June Recap: New AWS Sensitive Permissions and Services
Blog Published: 08/19/2024
Originally published by Sonrai Security.Written by Tally Shea.As AWS continues to evolve, new services and permissions are frequently introduced to enhance functionality and security. This blog provides a comprehensive recap of new sensitive permissions and services added in June. Our intention i...
What is SaaS Security?
Blog Published: 08/19/2024
Originally published by Own Company.Software-as-a-service (SaaS) has become a foundational element of modern businesses. Tapping into scalable, robust SaaS applications provides your organization with the agility it needs to compete. However, these apps also contain abundant sensitive data, which...
4 Steps for a Unified, Effective, and Continuous Compliance Program
Blog Published: 08/16/2024
Originally published by Scrut Automation.Regulatory Maze is Turning Everyone into a Lost Tourist The growing complexity of regulatory requirements has led to fragmentation in compliance programs across organizations of all sizes. Efforts to develop and enforce consolidated compliance programs sti...