Cloud 101CircleEventsBlog

All Articles

All Articles
Cybersecurity Nonprofits Form “Nonprofit Cyber” Coalition

Press Release Published: 02/23/2022

Nonprofits that focus on action and tangible results to more effectively collaborate and coordinate to increase efficiency and impact globallyNew York – Feb. 23, 2022 –The world’s leading implementation-focused nonprofit cybersecurity organizations today launched Nonprofit Cyber, a first-of-its-k...

ISO/IEC 27002:2022: Understanding the Update

Blog Published: 02/23/2022

A version of this blog was originally published here. Written by Ryan Mackie, Schellman & Company, LLC. On February 15, 2022, the notification came out that the 2022 version of ISO/IEC 27002 (ISO 27002) was going into publication. ISO standards typically go through a systemic review cycle eve...

NFT vs. Tokenization

Blog Published: 02/23/2022

This blog was originally published by TokenEx here. Written by Valerie Hare, TokenEx. When it comes to tokens, there are a wide range of types and use cases. For instance, people researching NFTs often get search results for other types of tokens and related processes, such as tokenization. Even ...

Healthcare Data Breach Prevention: Take Back Control

Blog Published: 02/23/2022

This blog was originally published by BigID here. Written by Kimberly Steele, BigID. In 2020, the U.S. Department of Health and Human Services Office for Civil Rights (OCR) revealed that healthcare data breach incidents had climbed up to a reported 1.76 per day, marking a 25% increase over report...

Why We Created the Global Security Database

Blog Published: 02/22/2022

The Global Security Database is a modern approach to a modern problem. CVE is an old approach to an old problem, one that still exists (legacy code bases), but has been superseded by new and much more complicated IT systems.Stage 1: We can improve CVE from withinIn the beginning (1999) there was ...

A Data Privacy Day Call to Arms: The Shared Responsibility to Protect Customer Data

Blog Published: 02/22/2022

This blog was originally published by JupiterOne here.Written by Melissa Pereira, JupiterOne. Today, millions of people worldwide are becoming aware of how their personal data is collected, shared, and monetized in our modern digital economy. Studies show that Americans are becoming increasingly ...

Five Surprising Findings From the 2022 Multi-Cloud Security Report

Blog Published: 02/22/2022

This blog was originally published by Valtix here. Written by Erik Kristiansen, Valtix. At the end of last year, Valtix released our first annual 2022 Multi-Cloud Security Report based on an independent research survey of 200 IT leaders. If you haven’t already downloaded your copy, you can do so ...

How CISOs Are Preparing to Tackle 2022

Blog Published: 02/21/2022

This blog was originally published by Microsoft here. Written by Vasu Jakkal, Corporate Vice President, Security, Compliance, Identity, and Management, Microsoft. Looking back over the last year, the security landscape has continued to experience significant change and escalation. Every day, ...

SAP Security Patch Day January 2022: Log4j Causes Record-Breaking Number of HotNews Notes

Blog Published: 02/21/2022

This blog was originally published by Onapsis on January 11, 2022. Written by Thomas Fritsch, Onapsis. Highlights of January SAP Security Notes analysis include:January Summary - 35 new and updated SAP security patches released, including 20 HotNews Notes and six High Priority Notes Information ...

CCSK Success Stories: From a CISO

Blog Published: 02/20/2022

This is part of a blog series interviewing cybersecurity professionals who have earned their Certificate of Cloud Security Knowledge (CCSK). In these blogs we invite individuals to share some of the challenges they face in managing security for cloud computing and how they were able to leverage k...

CSA Summit Coming to Minneapolis, MN

Blog Published: 02/19/2022

Written by Rachel Soanes, Director of Marketing and Communications for CSA MN Chapter BOD Cloud Security Alliance - Minnesota Chapter is excited to announce the first ever regional CSA Midwest Summit coming to Minneapolis, MN on April 5th, 2022. CSA MN is very excited to be co-hosting this event ...

Key Differences Between Legacy vs Cloud-First DLP

Blog Published: 02/18/2022

Written by Amit Kandpal, Director - Customer Success at Netskope The first blog in this series covered some critical and fundamental aspects of DLP transformation programs that are often not fully understood.A simple but effective framework to analyze the key differences between legacy DLP contex...

Leveraging CSA to React to Critical Risks

Blog Published: 02/18/2022

Written by JP Perez-Etchegoyen, CTO, Onapsis On February 8th, 2022, SAP released its SAP Security Notes as part of the monthly cadence of releasing security patches. This last patch Tuesday was noteworthy due to the release of patches for critical, unauthenticated, HTTP exploitable vulnerabilitie...

The Future of Cryptocurrency

Blog Published: 02/17/2022

This blog was originally published by VGS here. Written by Kenneth Geers, PhD, Information Security Analyst at VGS. In 2010, Laszlo Hanyecz paid 10,000 bitcoins for two pizzas. Today, with the price of bitcoin over over $40k, those same coins are worth nearly half a billion dollars. How could a s...

Multi Cloud Security

Blog Published: 02/17/2022

Written by Madhukeshwar Bhat, Director, Chapter Development, CSA Bangalore, and Rob Aragao, Chief Security Strategist, CyberRes “Computing may someday be organized as a public utility just as the telephone system is a public utility”- Prof. John McCarthy at MIT’s centennial celebration in 1961.T...

Ransomware Remains a Dominant Threat to Enterprises in 2022

Blog Published: 02/17/2022

This blog was originally published by BitSight here. Written by Marc Saltzman, Technology Journalist & Podcast Host of Tech It Out. What the disturbing trend means for your organization and third-party vendorsAs we start a new calendar year –nearly 24 months since the global pandemic started ...

The Evolution of Cloud Security in 2022

Blog Published: 02/16/2022

This blog was originally published by G2 here. Written by Aaron Walker, G2. This post is part of G2's 2022 digital trends series.Unified security for the distributed cloudIn the early days of cloud computing, businesses had a simple choice: adopt or don’t. Back then, security was a secondary conc...

New Cloud Security Alliance Report Highlights Factors to Consider When Designing Blockchain Solutions That Operate Within Critical Sectors

Press Release Published: 02/16/2022

Paper provides insights into the three layers of distributed ledger technology and how they interact with enterprise security services to deliver specific security outcomesSEATTLE – Feb. 16, 2022 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards...

From the Trenches: Common-Sense Measures to Prevent Cloud Incidents - Part 2

Blog Published: 02/16/2022

Written by Omri Segev Moyal & Brenton Morris, Profero - Rapid IRIntroduction In part one of this series, we discussed some specific incidents that we at Profero have dealt with in the past and some ways in which attackers can take advantage of cloud environments during an incident. In part t...

Protecting People from Recent Cyberattacks

Blog Published: 02/15/2022

This blog was originally published by Microsoft on December 6, 2021. Written by Tom Burt, Corporate Vice President, Customer Security & Trust, Microsoft. The Microsoft Digital Crimes Unit (DCU) has disrupted the activities of a China-based hacking group that we call Nickel. In documents...

Looking for the CCM?

Start using the Cloud Controls Matrix to simplify compliance with multiple standards & regulations.