Cloud 101CircleEventsBlog
Master CSA’s Security, Trust, Assurance, and Risk program—download the STAR Prep Kit for essential tools to enhance your assurance!

All Articles

All Articles
Network Intelligence: Required Information and Insights in This Digital Era

Blog Published: 04/18/2022

This blog was originally published by Gigamon here. Written by Mark Leary, IDC Research Director, Network Analytics and Automation. For more, read Part 1 of this series.In my previous guest blog, “Your Network and Their Cloud: Less Visibility. More Vulnerabilities,” I focused on the rising challe...

6 SDP Deployment Models to Achieve Zero Trust

Blog Published: 04/16/2022

Written by the SDP and Zero Trust Working GroupWith Software Defined Perimeter (SDP), enterprises can move away from traditional (and largely ineffective) perimeter-centric models, achieving the goals of Zero Trust and therefore improving their security effectiveness and resiliency. SDPs replace ...

Cyber Protection Week 2022: The Need (And Demand) For Integration Grows

Blog Published: 04/15/2022

This blog was originally published on March 31, 2022 by Acronis. Written by Dave Kostos, Acronis. For a long time, March 31 was World Backup Day: an annual event created to raise awareness of the importance of backup best practices. In 2020, we celebrated the final World Backup Day and, with a vi...

The Dangers of Exposed Elasticsearch Instances

Blog Published: 04/15/2022

This blog was originally published by Open Raven here. Written by Michael Ness, Open Raven. Elasticsearch is a widely used text-search and analytics engine. The tooling provides a simple solution to quickly, easily, and efficiently store and search large volumes of data. Elasticsearch is utilized...

Why You Need Application Security Testing for Business-Critical Applications

Blog Published: 04/14/2022

This blog was originally published by Onapsis here. This blog is about the importance of building secure business-critical applications with application security testing. While many organizations employ defense-in-depth security models to protect their critical systems, not enough consideration i...

Now, More Than Ever, Mentorship Matters in Cybersecurity

Blog Published: 04/14/2022

This blog was originally published by CXO REvolutionaries here. Written by Kavitha Mariappan, EVP, Customer Experience and Transformation, Zscaler. Twin trends unfolding within cybersecurity are making mentorship relationships more critical than ever. On the one hand, an increasingly digitized wo...

SANS Cloud Security Survey 2022 – Highlights

Blog Published: 04/14/2022

This blog was originally published by Vulcan Cyber here. Written by Orani Amroussi, Vulcan Cyber. In 2022, security issues have increased in cloud assets, leading to more data breaches involving cloud environments. But, despite the growing threats and attached cyber risk, organizations are undete...

Pentests Often Miss 6 Critical SaaS Security Issues. Here’s Why.

Blog Published: 04/13/2022

This blog was originally published by AppOmni here. Written by Tim Bach, Vice President of Engineering, AppOmni. As security and compliance teams assess the fallout and lessons learned from data breaches, they’ll need to re-evaluate their security practices and controls. This is particularly ...

New Cloud Security Alliance Paper Explores How Enterprises Can Augment, Integrate DNS Systems with Software-Defined Perimeter (SDP) to Enhance Security

Press Release Published: 04/13/2022

Security visibility, resiliency, and responsiveness can be improved by combining Domain Name Systems and enterprise-managed DDI systems with SDPSEATTLE – April 13, 2022 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and best ...

Governing the Organization

Blog Published: 04/13/2022

This blog was originally published by Coalfire here. Written by Matt Klein, Field CISO, Coalfire. Security is the biggest risk to business today. Managing security has become one of the hardest jobs in the enterprise, and failing to do so effectively can create opportunities for severe operationa...

The Evolution from SIEM to AI Driven Automation

Blog Published: 04/12/2022

This blog was originally published by LogicHub here. Written by Kumar Saurabh, LogicHub. Kumar Saurabh, LogicHub CEO and Co-founder, discusses his experience in the SIEM space and what he sees as the natural evolution from SIEM technology to AI and automation driven detection and response.The Ear...

Cyber Readiness and the Russia-Ukraine War

Blog Published: 04/12/2022

This blog was originally published on March 10, 2022 by Lookout. Written by Hank Schless, Senior Manager, Security Solutions, Lookout. I was encouraged when I saw our partners over at Microsoft step in when Russian cyberattacks commenced alongside their invasion of the Ukraine. While there ...

New Cloud Security Alliance Survey Finds SaaS Misconfigurations May Be Responsible for Up to 63 Percent of Security Incidents

Press Release Published: 04/12/2022

Proper visibility into SaaS security application settings and automated tools can mitigate risk SEATTLE – April 12, 2022 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computin...

20 DevSecOps Best Practices Across People, Process and Technology

Blog Published: 04/12/2022

This blog was originally published by Contino here. Written by Marcus Maxwell, Contino. How can secure software be developed at speed and scale!?This is the ultimate IT paradox for modern global enterprise organisations: go faster and innovate. But always stay secure.DevSecOps is the answer to in...

Put Your Trust in the Stack

Blog Published: 04/11/2022

This blog was originally published by Entrust here. Written by Wayne Lewandowski, Vice President of Sales, Entrust Data Protection Solutions. Breaches, infiltration, exfiltration, compromised privileges, and interrupted access to critical systems are all parts of a well-written espionage movie, o...

6 Questions to Ask Along Your Journey to the Cloud

Blog Published: 04/11/2022

Written by Robert Clyde, ShardSecure A few years ago, a question many enterprises wrestled with was whether migrating to the cloud was a worthwhile endeavor. While there are still some server-huggers, enterprises have resoundingly answered ”yes” to that question and moved beyond that basic ques...

How to Prepare for the Changes to the ISO Standards

Blog Published: 04/09/2022

The CSA Security Update podcast is hosted by John DiMaria, CSA Assurance Investigatory Fellow, and explores the STAR Program, CSA best practices, research, and associated technologies and tools. This blog is part of a series where we edit key CSA Security Update episodes into shorter Q&As. In...

What NIST SP 800-207 Means for SaaS Security

Blog Published: 04/08/2022

This blog was originally published by DoControl here. Written by Corey O'Connor, DoControl. The National Institute of Standards and Technology (NIST) and Cybersecurity and Infrastructure Security Agency (CISA) in August 2020 published NIST Special Publication 800-207. This special publication fol...

CCSK Success Stories: From a Network and Security Technical Manager

Blog Published: 04/08/2022

This is part of a blog series interviewing cybersecurity professionals who have earned their Certificate of Cloud Security Knowledge (CCSK). In these blogs we invite individuals to share some of the challenges they face in managing security for cloud computing and how they were able to leverage k...

Leverage Zero Trust to Defend Against Geopolitical Uncertainty

Blog Published: 04/07/2022

This blog was originally published by CXO REvolutionaries on March 24, 2022. Written by Brad Moldenhauer, CISO, Zscaler. As a major shift in the global geopolitical balance, Russia’s invasion of Ukraine has many dimensions, including militaristic, political, legal, cultural, and economic. We sho...

Looking for the CCM?

Start using the Cloud Controls Matrix to simplify compliance with multiple standards & regulations.