How SOC 2 Is Changing the Face of Compliance in the Caribbean: Part Two
Blog Published: 04/28/2022
Written by Cloud Carib As Caribbean cloud providers grow and expand into new markets, it has become vital that such organizations meet rigorous, standardized requirements. In part one of our series, we established why standardized compliance standards like SOC 2 (Service Organization Control 2) a...
MFA Is Only As Effective As We Want It To Be
Blog Published: 04/28/2022
Written by Authomize Good cybersecurity is all about getting the basics right. Sure, AI and other advanced technologies help us to cyber better, faster, stronger, etc. But the really important work is all about actually using the most basic of tools to fend off the vast majority of attacks. One o...
Doing Business in Brazil? Get to Know the General Personal Data Protection Law (LGPD)
Blog Published: 04/27/2022
Written by VGS. Did you know that Brazil is bigger than the 48 contiguous United States? The US is only bigger than Brazil if you add Alaska! São Paulo, with over 21 million residents, is more populous than New York. And Brazil’s 210 million citizens enjoy a thriving economy: Brazil’s Gross Domes...
5 Benefits of Detection-as-Code
Blog Published: 04/27/2022
This blog was originally published by Panther here. Written by Kartikey Pandey, Panther. How modern teams can automate security analysis at scale in the era of everything-as-code.TL;DR: Adopt a modern, test-driven methodology for securing your organization with Detection-as-Code.Over the past dec...
As You Move to the Cloud, Make Sure Your PKI Goes with You
Blog Published: 04/26/2022
This blog was originally published by Entrust here. Written by Samantha Mabey, Product Marketing Management Director, Certificate Solutions at Entrust. I’m sure most of us have heard the buzz around “multi-cloud” or “hybrid cloud.” But what exactly does it mean? And more importantly, what does it...
Cloud Security Alliance Updates Internet of Things (IoT) Controls Matrix with New Incident Management Domain and Enhanced Technical Clarity and Referencing
Press Release Published: 04/26/2022
Expanded Matrix aimed at enterprise IoT systems that incorporate multiple types of connected devices, cloud services, and networking technologiesSEATTLE – April 26, 2022 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and best...
How SOC 2 Is Changing the Face of Compliance in the Caribbean: Part One
Blog Published: 04/26/2022
Written by Cloud Carib For small island developing nations across the Caribbean and Latin American region, 2020 will, among other things, be remembered as a major catalyst for the acceleration of digital transformation. The onset of the global pandemic exposed major cracks in the infrastructure m...
The Challenge of Protecting Business-Critical Data and Applications
Blog Published: 04/25/2022
This blog was originally published by Onapsis here. Global market intelligence firm IDC conducted a market survey in Germany in September 2021 to explore the challenges enterprises are currently facing in the development and running of security landscapes, as well as the plans they are pursuing t...
Higher Ed Gets an 'F' for Ransomware Protection: How the Industry Must Evolve
Blog Published: 04/25/2022
This blog was originally published by CXO REvolutionaries here.Written by Bryan Green, Chief Information Security Officer, Zscaler. Colleges and universities are amongst the slowest populations to modernize security controls, resulting in a high price tag – ransomware and breaches.It’s human natu...
Women in Cybersecurity: Interviews with CSA’s Staff
Blog Published: 04/24/2022
.In cybersecurity, and the tech industry in general, men significantly outnumber women. However, more women are joining the field every day, helping to pave the way for others and proving that it benefits us all to hire a diverse workforce. Below, we’ve compiled four interviews with some of the w...
Cloud Security Best Practices from the Cloud Security Alliance
Blog Published: 04/23/2022
Cloud is becoming the backend for all forms of computing and is the foundation for the information security industry. It’s a model for enabling convenient and on-demand network access to a shared pool of computing resources that can be rapidly provisioned and released with minimal management effo...
DevSecOps Best Practices for Vulnerability Management in the Cloud
Blog Published: 04/22/2022
This blog was originally published by Vulcan Cyber here. Written by Natalie Kriheli, Vulcan Cyber. With DevSecOps best practices, teams can remain on top of their security controls while taking full advantage of everything the cloud has to offer. A growing trend in the cloud ecosystem, DevSecOps ...
Four Ways to Use the Cloud Security Maturity Model
Blog Published: 04/22/2022
This blog was originally published by Secberus here. Written by Fausto Lendeborg, Secberus.With a name like, Cloud Security Maturity Model, you may be one of the CISOs who think: Sounds like a lot of work.Where does my organization sit?How do we advance?Why should I care?And if any of those quest...
Threat Modelling: What It Is and Why It Matters
Blog Published: 04/21/2022
This blog was originally published by Contino here. Written by Marcus Maxwell, Contino. Identifying the security threats that your systems face is one step towards mitigating potential vulnerabilities as part of a wider risk management strategy. But on its own, awareness of threats is not enough ...
A Look Inside a Benchmark Model In InfoSec: CIA Triad
Blog Published: 04/21/2022
This blog was originally published by SafeBase here. We are constantly hearing tips and tricks on how to protect our data - get a VPN, back everything up on a cloud, change your passwords, etc.. And in the business world, there are tons of policies in place and certifications that can be acquired...
Security Performance Reporting
Blog Published: 04/20/2022
Command guidance for CISO-to-stakeholder communications Written by John Hellickson, Field CISO, Coalfire There is tremendous urgency for security professionals to do a better job at communicating security program performance to enterprise stakeholders and boards of directors. For the Coalfire ...
Cloud Security Alliance Paper Offers Executive Management Guidance on Factors to Consider When Implementing Serverless Architectures
Press Release Published: 04/20/2022
Report reviews risks, security concerns that accompany serverless architecture and offers industry-wide security best practices for adoptionSEATTLE – April 20, 2022 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and best prac...
Weathering Russian Winter: The Current State of Russian APTs
Blog Published: 04/20/2022
This blog was originally published by LogicHub on April 8, 2022. Written by Tessa Mishoe, Senior Threat Analyst, LogicHub. Russian Advanced Persistent Threats (APTs)It’s no secret that Russian Advanced Persistent Threats (APTs) are a significant burden on cybersecurity teams. For years, organizat...
Crypto Caper: How Cybercriminals Steal Crypto from Blockchain Networks
Blog Published: 04/19/2022
This blog was originally published by TokenEx here. Written by Valerie Hare, TokenEx. In 2009, the first established cryptocurrency was born – Bitcoin. If you aren't familiar with cryptocurrency, it's an online currency with ledgers secured by encryption. Since those early years, digital currency...
What the Businesses at Work Report Means for Your SaaS Security Program
Blog Published: 04/18/2022
This blog was originally published on February 22, 2022 by DoControl. Written by Corey O'Connor, DoControl. Earlier this month, Identity and access management platform leader Okta published their 8th annual “Businesses at Work” report. The report pulls data from their more than 14,000 global cust...