7 Technology Innovations That Will Impact Cybersecurity in 2022 and Beyond
Blog Published: 03/27/2022
Cloud has become the foundation for launching new technologies. As these new technologies are developed and adopted by enterprises, they will increasingly impact cybersecurity. Help our industry start preparing for the future by informing yourself of the top emerging technologies to watch for.Vie...
Amazon Ring: A Case of Data Security and Privacy
Blog Published: 03/26/2022
This case study is based off of CSA’s Top Threats to Cloud Computing: Egregious Eleven Deep Dive. The Deep Dive connects the dots between CSA Top Threats through the use of nine real-world attacks and breaches. Pulling from one of the case studies, this article provides a security analysis overvi...
Hey You, Get Out of My Cloud!
Blog Published: 03/25/2022
Written by Jim Mandelbaum, Gigamon Field CTO When we take a cloud solution to production how do we know who has access to that data? The process of deploying the production environment has certainly involved several groups and individuals. Who still has access and what can they do with it? Ho...
Cyber Attacks in Russia’s Invasion of Ukraine
Blog Published: 03/25/2022
This blog was originally published by Orca Security on March 11, 2022. Written by Bar Kaduri, Orca Security. The modern internet has drastically changed the landscape of threats. It created a new dimension where countries and individuals can affect, disrupt and demolish systems that comprise our ...
Cloud and Sovereignty: Are They Compatible?
Blog Published: 03/24/2022
This blog was originally published by Atos here. Written by Frederic Malicki, Pierre Brun-Murol, and Dominique Michiels. In a period where moving to cloud and sovereignty are becoming central for many companies and institutions — especially in Europe — let’s take a moment to examine the apparent ...
Adopting AI-based Attack Detection
Blog Published: 03/24/2022
This blog was originally published by LogicHub here. Written by Willy Leichter, Chief Marketing Officer, LogicHub. The security industry is long-overdue for real innovation with the practical application of emerging technologies around automation, machine learning, and artificial intelligence for...
Ownership, Control and Possession – Options for Key Management in the Cloud
Blog Published: 03/24/2022
This blog was originally published by Entrust here. By Iain Beveridge, Senior Product Marketing Manager, Data Protection Solutions at Entrust. My favourite scene from mid-80’s movie Ferris Bueller’s Day Off, was when Ferris (Matthew Broderick) and his friends roll into a rather shady looking va...
Financial Sector and Cloud Security Providers Complete Initiative To Enhance Cybersecurity
Press Release Published: 03/23/2022
A joint trade initiative identifies roles and responsibilities between firms and cloud security providers, establishing a mutually beneficial framework for cybersecurity.Seattle —The Cyber Risk Institute (CRI), the Cloud Security Alliance (CSA), and the Bank Policy Institute-BITS announced today ...
The Debate: Should You Build or Buy CAASM?
Blog Published: 03/23/2022
This blog was originally published by JupiterOne here. Written by Jasmine Henry, JupiterOne. Should you build or buy a CAASM solution? It’s a valid question, especially in an ecosystem rich with open source and low-cost security tools. You don’t need enterprise software to create API integrations...
To Err is Human, and That is What Hackers are Counting On
Blog Published: 03/23/2022
Originally published January 20, 2022 on Fugue’s website. Written by Josh Stella. Read the first blog in this series here. It’s understandable if you’ve made thwarting ransomware your top cybersecurity priority for 2022. The number of successful ransomware attacks, which encrypt computers unt...
Data Breach vs Data Exposure
Blog Published: 03/22/2022
This blog was originally published by TokenEx here. Written by Anni Burchfiel, TokenEx. Data breaches have become increasingly common, and costly, as the world continues to work from home. According to CyberTalk in 2021, 36 billion company records were exposed, and data breach costs soared to $4....
The Top 22 Digital Transformation Trends To Look Out For In 2022
Blog Published: 03/22/2022
This blog was originally published by Contino here. Written by Deepak Ramchandani, Contino. 2021 was a big year in the world of digital transformation. The pandemic continued to push businesses to accelerate their digital journeys. From data-driven sustainability initiatives to cloud-first remote...
Five Cloud Security Traps (And How to Avoid Them)
Blog Published: 03/21/2022
This blog was originally published by Vulcan Cyber here. Written by Gal Gonen, Vulcan Cyber. It’s no surprise that one of the biggest concerns for companies using the cloud – whether they were born in the cloud or migrated to one – is the attached security management, specifically when “operating...
Your Data Is Everywhere: Here Are The Critical Capabilities Of A Modern Data Loss Prevention (DLP)
Blog Published: 03/21/2022
This blog was originally published by Lookout here. Written by Sundaram Lakshmanan, CTO of SASE Products, Lookout. In some ways, IT teams had a great life in the early 2000s. Data was stored inside data centers and accessed through known ingress and egress points like a castle with a limited numb...
The CSA Triangle Chapter Supports Veterans and Grows Talent in the Triangle
Blog Published: 03/20/2022
The Cloud Security Alliance Triangle Chapter began as a grassroots initiative in 2018 when Eric Hart recognized the need for advancing the mission of cloud security in the Triangle (Raleigh, Durham, Chapel Hill) area of North Carolina.Eric recognized the potential when meeting with Kyle Mitchell ...
Scam and Circumstance
Blog Published: 03/19/2022
If a burglar breaks into your home and steals your TV, the first thing you do is what was taught back in kindergarten: call 911. Within minutes the authorities will arrive at your doorstep and work tirelessly to resolve this. In the digital world, if someone hacks into your computer and steals yo...
What Are Cloud Controls?
Blog Published: 03/19/2022
There are many risks associated with cloud computing. Therefore, it’s critical to understand cloud security before attempting to migrate your organization to the cloud.Cloud controls are safeguards or countermeasures that help organizations manage risk in the cloud. Cloud controls can be policies...
Key Ways to Improve DLP Coverage and Accuracy
Blog Published: 03/18/2022
Written by Amit Kandpal, Director - Customer Success at NetskopeIn this blog series, we’ve been examining key questions for cloud DLP transformation. Make sure to also check out Part 1, Part 2, and Part 3. In this final part, let’s look at some available options in decreasing order of breadth in ...
CCSK Success Stories: From an IT Security Auditor
Blog Published: 03/18/2022
This is part of a blog series interviewing cybersecurity professionals who have earned their Certificate of Cloud Security Knowledge (CCSK). In these blogs we invite individuals to share some of the challenges they face in managing security for cloud computing and how they were able to leverage k...
The Italian Agency for National Cybersecurity Embraces the STAR Program
Blog Published: 03/17/2022
Written by Daniele Catteddu, CTO, CSA and John DiMaria, Assurance Investigatory Fellow, CSA Flashback: In the 1980s, ISO 9001 was taking the world by storm. The paradigm of what quality looked like had changed. Nothing you did prior seemed to make any difference. Organizations were putting suppli...