ChaptersCircleEventsBlog

All Articles

All Articles
What is Cloud Penetration Testing?

Blog Published: 02/12/2022

Written by the CSA Top Threats Working Group. Also known as ethical hacking, cloud penetration testing evaluates security and discovers vulnerabilities by utilizing hacker tools and techniques. Security testing in general is crucial to the security assurance of cloud environments, systems and ...

Are You Ready for the Great Cybersecurity RESET?

Blog Published: 02/14/2022

This blog was originally published by CXO REvolutionaries here. Written by Phil Armstrong, EVP & Global CIO (former). Have you heard about the “great cybersecurity RESET” yet? The reset is a new wave of activity and an emerging global trend centered around cybersecurity planning. Businesse...

ICMAD: Critical Vulnerabilities in SAP Business Applications Require Immediate Attention

Blog Published: 02/14/2022

This blog was originally published by Onapsis on February 8, 2022. Written by JP Perez-Etchegoyen and the Onapsis Research Labs. Detailed research from the Onapsis Research Labs throughout 2021 around HTTP Response Smuggling led to the recent discovery of a set of extremely critical vul...

Behind The Buzzword: Four Ways To Assess Your Zero Trust Security Posture

Blog Published: 02/15/2022

This blog was originally published by Lookout here. Written by Hank Schless, Senior Manager, Security Solutions, Lookout. With just about everything delivered from the cloud these days, employees can now collaborate and access what they need from anywhere and on any device. While this newfound...

Protecting People from Recent Cyberattacks

Blog Published: 02/15/2022

This blog was originally published by Microsoft on December 6, 2021. Written by Tom Burt, Corporate Vice President, Customer Security & Trust, Microsoft. The Microsoft Digital Crimes Unit (DCU) has disrupted the activities of a China-based hacking group that we call Nickel. In docume...

The Italian Agency for National Cybersecurity Embraces the STAR Program

Blog Published: 03/17/2022

Written by Daniele Catteddu, CTO, CSA and John DiMaria, Assurance Investigatory Fellow, CSA Flashback: In the 1980s, ISO 9001 was taking the world by storm. The paradigm of what quality looked like had changed. Nothing you did prior seemed to make any difference. Organizations were putting sup...

From the Trenches: Common-Sense Measures to Prevent Cloud Incidents - Part 2

Blog Published: 02/16/2022

Written by Omri Segev Moyal & Brenton Morris, Profero - Rapid IRIntroduction In part one of this series, we discussed some specific incidents that we at Profero have dealt with in the past and some ways in which attackers can take advantage of cloud environments during an incident. In par...

The Evolution of Cloud Security in 2022

Blog Published: 02/16/2022

This blog was originally published by G2 here. Written by Aaron Walker, G2. This post is part of G2's 2022 digital trends series.Unified security for the distributed cloudIn the early days of cloud computing, businesses had a simple choice: adopt or don’t. Back then, security was a secondary c...

Ransomware Remains a Dominant Threat to Enterprises in 2022

Blog Published: 02/17/2022

This blog was originally published by BitSight here. Written by Marc Saltzman, Technology Journalist & Podcast Host of Tech It Out. What the disturbing trend means for your organization and third-party vendorsAs we start a new calendar year –nearly 24 months since the global pandemic start...

New Cloud Security Alliance Report Highlights Factors to Consider When Designing Blockchain Solutions That Operate Within Critical Sectors

Press Release Published: 02/16/2022

Paper provides insights into the three layers of distributed ledger technology and how they interact with enterprise security services to deliver specific security outcomesSEATTLE – Feb. 16, 2022 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standa...

Multi Cloud Security

Blog Published: 02/17/2022

Written by Madhukeshwar Bhat, Director, Chapter Development, CSA Bangalore, and Rob Aragao, Chief Security Strategist, CyberRes “Computing may someday be organized as a public utility just as the telephone system is a public utility”- Prof. John McCarthy at MIT’s centennial celebration in 196...

The Future of Cryptocurrency

Blog Published: 02/17/2022

This blog was originally published by VGS here. Written by Kenneth Geers, PhD, Information Security Analyst at VGS. In 2010, Laszlo Hanyecz paid 10,000 bitcoins for two pizzas. Today, with the price of bitcoin over over $40k, those same coins are worth nearly half a billion dollars. How could ...

Leveraging CSA to React to Critical Risks

Blog Published: 02/18/2022

Written by JP Perez-Etchegoyen, CTO, Onapsis On February 8th, 2022, SAP released its SAP Security Notes as part of the monthly cadence of releasing security patches. This last patch Tuesday was noteworthy due to the release of patches for critical, unauthenticated, HTTP exploitable vulnerabili...

Key Differences Between Legacy vs Cloud-First DLP

Blog Published: 02/18/2022

Written by Amit Kandpal, Director - Customer Success at Netskope The first blog in this series covered some critical and fundamental aspects of DLP transformation programs that are often not fully understood.A simple but effective framework to analyze the key differences between legacy DLP con...

CSA Summit Coming to Minneapolis, MN

Blog Published: 02/19/2022

Written by Rachel Soanes, Director of Marketing and Communications for CSA MN Chapter BOD Cloud Security Alliance - Minnesota Chapter is excited to announce the first ever regional CSA Midwest Summit coming to Minneapolis, MN on April 5th, 2022. CSA MN is very excited to be co-hosting this eve...

CCSK Success Stories: From a CISO

Blog Published: 02/20/2022

This is part of a blog series interviewing cybersecurity professionals who have earned their Certificate of Cloud Security Knowledge (CCSK). In these blogs we invite individuals to share some of the challenges they face in managing security for cloud computing and how they were able to leverag...

SAP Security Patch Day January 2022: Log4j Causes Record-Breaking Number of HotNews Notes

Blog Published: 02/21/2022

This blog was originally published by Onapsis on January 11, 2022. Written by Thomas Fritsch, Onapsis. Highlights of January SAP Security Notes analysis include:January Summary - 35 new and updated SAP security patches released, including 20 HotNews Notes and six High Priority Notes Informati...

How CISOs Are Preparing to Tackle 2022

Blog Published: 02/21/2022

This blog was originally published by Microsoft here. Written by Vasu Jakkal, Corporate Vice President, Security, Compliance, Identity, and Management, Microsoft. Looking back over the last year, the security landscape has continued to experience significant change and escalation. Every da...

Five Surprising Findings From the 2022 Multi-Cloud Security Report

Blog Published: 02/22/2022

This blog was originally published by Valtix here. Written by Erik Kristiansen, Valtix. At the end of last year, Valtix released our first annual 2022 Multi-Cloud Security Report based on an independent research survey of 200 IT leaders. If you haven’t already downloaded your copy, you can do ...

Healthcare Data Breach Prevention: Take Back Control

Blog Published: 02/23/2022

This blog was originally published by BigID here. Written by Kimberly Steele, BigID. In 2020, the U.S. Department of Health and Human Services Office for Civil Rights (OCR) revealed that healthcare data breach incidents had climbed up to a reported 1.76 per day, marking a 25% increase over rep...

Looking for the CCM?

Start using the Cloud Controls Matrix to simplify compliance with multiple standards & regulations.