Cloud 101CircleEventsBlog

All Articles

All Articles
Predictions 2022: Five Threats That Will Impact Your Personal Data And Privacy

Blog Published: 03/09/2022

This blog was originally published by Lookout here. Written by Firas Azmeh, General Manager, Personal Digital Safety & Carrier Partnerships, Lookout. It will be increasingly difficult to tell what is legitimate online‍ In Q1 of 2021, 4 in 10 people encountered an unsafe link while using their...

Cloud Security Alliance Teams with CrowdStrike, Okta, and Zscaler to Create Focal Point for Zero Trust Education and Best Practices

Press Release Published: 03/09/2022

CSA’s Zero Trust Advancement Center to develop research, training, professional credentialing and an online center for community Zero Trust resourcesSEATTLE – March 9, 2022 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications and be...

Payments 101: Card Networks & Transactions

Blog Published: 03/09/2022

This blog was originally published by VGS here. Written by Kenneth Geers, PhD, Information Security Analyst at VGS. Accounting is one of the oldest professions, as evidenced by financial records four times older than the Great Pyramids of Egypt. “Tally marks” etched into the thigh bone of a baboo...

Legacy Cybersecurity is an Albatross: Digital Success Needs a Better Model

Blog Published: 03/08/2022

This blog was originally published by CXO REvolutionaries here. Written by Rohit Adlakha, Chief Digital & Information Officer and Global Head, Wipro HOLMES™ (former). The security market is growing exponentially. But is it growing the right way, or is it just more of the same?Digital disrupti...

Your Network and Their Cloud: Less Visibility. More Vulnerabilities.

Blog Published: 03/08/2022

This blog was originally published by Gigamon here. Written by Mark Leary, IDC Research Director, Network Analytics and Automation. Cloud services form a core component of a resilient digital infrastructure. Cloud-first has developed into a primary infrastructure and application strategy for a go...

CAASM Should Be an Early Security Investment in Every CISO’s Playbook

Blog Published: 03/07/2022

This blog was originally published by JupiterOne here. Written by Jasmine Henry, JupiterOne. It’s possible to improve your security posture on a shoestring budget. There are a growing number of open source tools for security and compliance, but there are also key areas to invest in at the beginni...

Key Steps to Follow Before Embarking on Specific DLP Policies

Blog Published: 03/04/2022

Written by Amit Kandpal, Director - Customer Success at Netskope. Make sure to also check out Part 1 and Part 2 of this series. As discussed briefly in the first part of this blog series, it is very important to reduce the risk surface area before jumping into configuring and tuning specific DLP ...

CCSK Success Stories: From a Computer Science Student

Blog Published: 03/04/2022

This is part of a blog series interviewing individuals who have earned their Certificate of Cloud Security Knowledge (CCSK), inviting them to share how they were able to leverage knowledge from the CCSK in their current roles. In this blog, we'll be interviewing Angel Sayani, a 19-year-old develo...

Kubernetes Security Best Practices: Definitive Guide

Blog Published: 03/03/2022

This blog was originally published by ARMO here. Written by Jonathan Kaftzan, VP Marketing & Business Development, ARMO. IntroductionKubernetes, an open-source microservice orchestration engine, is well known for its ability to automate the deployment, management, and, most importantly, scali...

Kraft Heinz CISO Ricardo Lafosse to Headline Cloud Security Alliance Summit at RSA Conference 2022

Press Release Published: 03/03/2022

Registration opens today for CxO Trust Summit, which will explore C-suite’s biggest cloud computing challenges and how CxO Trust Initiative mitigates riskSEATTLE – March 3, 2022 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, ...

DevSecOps Automation

Blog Published: 03/03/2022

Getting to market faster requires top-down, customer-first prioritization Written by Adam Kerns, Managing Principal, Cloud Engineering, Coalfire. This blog is based on Coalfire’s Securerealities report, Smartest Path to DevSecOps Transformation. Automation is on everyone's path to DevS...

The Benefits of Confidential Computing for Government Agencies

Blog Published: 03/02/2022

This blog was originally published by Anjuna here. Government agencies occupy a unique position when it comes to protecting data. Unlike private enterprises, which include proprietary ownership, profitability and competitive advantage in their goals, a government agency is responsible for safegu...

How Zero Trust Security Will Revolutionize DevSecOps

Blog Published: 03/01/2022

This blog was originally published by Appgate here. Written by Kurt Glazemakers, Appgate. Due to the rise of the cloud and containers, software development has made giant steps forward in productivity, agility and scale. DevOps and DevSecOps have created controlled, easily deployable, secure and ...

The Significance of PwnKit to Insider Threats

Blog Published: 03/01/2022

This blog was originally published by Alert Logic here. Written by Josh Davies, Alert Logic. Alert Logic has been covering and tracking PwnKit since its initial discovery, and we’ve developed the appropriate detection and coverage to both determine exposure and identify compromises. PwnKit all...

Build a Stronger Cybersecurity Team Through Diversity and Training

Blog Published: 02/28/2022

This blog was originally published by Microsoft here. Written by Natalia Godyla, Product Marketing Manager, Microsoft Security and Heath Adams, Chief Executive Officer, TCM Security. The security community is continuously changing, growing, and learning from each other to better position the w...

Appraising Operating Effectiveness of Controls for Your SOC 1 or 2 Audit

Blog Published: 02/28/2022

This blog was originally published by CAS Assurance here. OverviewWhether we are dealing with Service Organization Controls (SOC) 1 audit or talking about Service Organization Controls (SOC) 2 audit, the operating effectiveness of controls is of paramount importance. Not only for passing an audit...

Pfizer IP Leak Isn’t Unique. Protect Your Cloud Data With Proactive Encryption.

Blog Published: 02/25/2022

This blog was originally published by Lookout on December 17, 2021. Written by Hank Schless, Senior Manager, Security Solutions, Lookout. The pharmaceutical company Pfizer recently acknowledged that thousands of internal documents were leaked, including trade secrets related to its COVID-19 vacci...

The North Star Your Cloud Strategy Needs

Blog Published: 02/25/2022

This blog was originally published by Booz Allen here. Written by Delie Minaie, Booz Allen. Orient cloud success around mission assuranceAs IT leaders throughout the federal government look to guide their agencies toward enterprise-wide cloud maturity, they are met with endless choices regarding ...

A Thumbprint Almost Ended our Vacation, or GDPR and the Cloud

Blog Published: 02/24/2022

A version of this blog was originally published by ShardSecure here. By Marc Blackmer, ShardSecure. A few years ago, we surprised our youngest with a trip to Florida. We did the whole pickup-from-school-with-our-luggage-in-the-car bit and drove straight to the airport. And there was much rejoic...

Security Service Edge (SSE) Reflects a Changing Market: What You Need to Know

Blog Published: 02/24/2022

This blog was originally published by CXO REvolutionaries here. Written by Sanjit Ganguli, VP Transformation Strategy/Field CTO - Global Enterprise, Zscaler. What the world needs is another acronym in cyber security, said absolutely NO ONE. However, as a former Gartner analyst who helped bring my...

Looking for the CCM?

Start using the Cloud Controls Matrix to simplify compliance with multiple standards & regulations.