ChaptersCircleEventsBlog

All Articles

All Articles
NFT vs. Tokenization

Blog Published: 02/23/2022

This blog was originally published by TokenEx here. Written by Valerie Hare, TokenEx. When it comes to tokens, there are a wide range of types and use cases. For instance, people researching NFTs often get search results for other types of tokens and related processes, such as tokenization. Ev...

ISO/IEC 27002:2022: Understanding the Update

Blog Published: 02/23/2022

A version of this blog was originally published here. Written by Ryan Mackie, Schellman & Company, LLC. On February 15, 2022, the notification came out that the 2022 version of ISO/IEC 27002 (ISO 27002) was going into publication. ISO standards typically go through a systemic review cycle ...

Cybersecurity Nonprofits Form “Nonprofit Cyber” Coalition

Press Release Published: 02/23/2022

Nonprofits that focus on action and tangible results to more effectively collaborate and coordinate to increase efficiency and impact globallyNew York – Feb. 23, 2022 –The world’s leading implementation-focused nonprofit cybersecurity organizations today launched Nonprofit Cyber, a first-of-it...

A Thumbprint Almost Ended our Vacation, or GDPR and the Cloud

Blog Published: 02/24/2022

A version of this blog was originally published by ShardSecure here. By Marc Blackmer, ShardSecure. A few years ago, we surprised our youngest with a trip to Florida. We did the whole pickup-from-school-with-our-luggage-in-the-car bit and drove straight to the airport. And there was much rej...

Security Service Edge (SSE) Reflects a Changing Market: What You Need to Know

Blog Published: 02/24/2022

This blog was originally published by CXO REvolutionaries here. Written by Sanjit Ganguli, VP Transformation Strategy/Field CTO - Global Enterprise, Zscaler. What the world needs is another acronym in cyber security, said absolutely NO ONE. However, as a former Gartner analyst who helped bring...

The North Star Your Cloud Strategy Needs

Blog Published: 02/25/2022

This blog was originally published by Booz Allen here. Written by Delie Minaie, Booz Allen. Orient cloud success around mission assuranceAs IT leaders throughout the federal government look to guide their agencies toward enterprise-wide cloud maturity, they are met with endless choices regardi...

Pfizer IP Leak Isn’t Unique. Protect Your Cloud Data With Proactive Encryption.

Blog Published: 02/25/2022

This blog was originally published by Lookout on December 17, 2021. Written by Hank Schless, Senior Manager, Security Solutions, Lookout. The pharmaceutical company Pfizer recently acknowledged that thousands of internal documents were leaked, including trade secrets related to its COVID-19 va...

Appraising Operating Effectiveness of Controls for Your SOC 1 or 2 Audit

Blog Published: 02/28/2022

This blog was originally published by CAS Assurance here. OverviewWhether we are dealing with Service Organization Controls (SOC) 1 audit or talking about Service Organization Controls (SOC) 2 audit, the operating effectiveness of controls is of paramount importance. Not only for passing an au...

Build a Stronger Cybersecurity Team Through Diversity and Training

Blog Published: 02/28/2022

This blog was originally published by Microsoft here. Written by Natalia Godyla, Product Marketing Manager, Microsoft Security and Heath Adams, Chief Executive Officer, TCM Security. The security community is continuously changing, growing, and learning from each other to better position th...

The Significance of PwnKit to Insider Threats

Blog Published: 03/01/2022

This blog was originally published by Alert Logic here. Written by Josh Davies, Alert Logic. Alert Logic has been covering and tracking PwnKit since its initial discovery, and we’ve developed the appropriate detection and coverage to both determine exposure and identify compromises. PwnKit ...

How Zero Trust Security Will Revolutionize DevSecOps

Blog Published: 03/01/2022

This blog was originally published by Appgate here. Written by Kurt Glazemakers, Appgate. Due to the rise of the cloud and containers, software development has made giant steps forward in productivity, agility and scale. DevOps and DevSecOps have created controlled, easily deployable, secure a...

Kraft Heinz CISO Ricardo Lafosse to Headline Cloud Security Alliance Summit at RSA Conference 2022

Press Release Published: 03/03/2022

Registration opens today for CxO Trust Summit, which will explore C-suite’s biggest cloud computing challenges and how CxO Trust Initiative mitigates riskSEATTLE – March 3, 2022 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certification...

The Benefits of Confidential Computing for Government Agencies

Blog Published: 03/02/2022

This blog was originally published by Anjuna here. Government agencies occupy a unique position when it comes to protecting data. Unlike private enterprises, which include proprietary ownership, profitability and competitive advantage in their goals, a government agency is responsible for saf...

DevSecOps Automation

Blog Published: 03/03/2022

Getting to market faster requires top-down, customer-first prioritization Written by Adam Kerns, Managing Principal, Cloud Engineering, Coalfire. This blog is based on Coalfire’s Securerealities report, Smartest Path to DevSecOps Transformation. Automation is on everyone's path to D...

Kubernetes Security Best Practices: Definitive Guide

Blog Published: 03/03/2022

This blog was originally published by ARMO here. Written by Jonathan Kaftzan, VP Marketing & Business Development, ARMO. IntroductionKubernetes, an open-source microservice orchestration engine, is well known for its ability to automate the deployment, management, and, most importantly, sc...

CCSK Success Stories: From a Computer Science Student

Blog Published: 03/04/2022

This is part of a blog series interviewing individuals who have earned their Certificate of Cloud Security Knowledge (CCSK), inviting them to share how they were able to leverage knowledge from the CCSK in their current roles. In this blog, we'll be interviewing Angel Sayani, a 19-year-old dev...

Key Steps to Follow Before Embarking on Specific DLP Policies

Blog Published: 03/04/2022

Written by Amit Kandpal, Director - Customer Success at Netskope. Make sure to also check out Part 1 and Part 2 of this series. As discussed briefly in the first part of this blog series, it is very important to reduce the risk surface area before jumping into configuring and tuning specific D...

CAASM Should Be an Early Security Investment in Every CISO’s Playbook

Blog Published: 03/07/2022

This blog was originally published by JupiterOne here. Written by Jasmine Henry, JupiterOne. It’s possible to improve your security posture on a shoestring budget. There are a growing number of open source tools for security and compliance, but there are also key areas to invest in at the begi...

Your Network and Their Cloud: Less Visibility. More Vulnerabilities.

Blog Published: 03/08/2022

This blog was originally published by Gigamon here. Written by Mark Leary, IDC Research Director, Network Analytics and Automation. Cloud services form a core component of a resilient digital infrastructure. Cloud-first has developed into a primary infrastructure and application strategy for a...

Legacy Cybersecurity is an Albatross: Digital Success Needs a Better Model

Blog Published: 03/08/2022

This blog was originally published by CXO REvolutionaries here. Written by Rohit Adlakha, Chief Digital & Information Officer and Global Head, Wipro HOLMES™ (former). The security market is growing exponentially. But is it growing the right way, or is it just more of the same?Digital disru...

Looking for the CCM?

Start using the Cloud Controls Matrix to simplify compliance with multiple standards & regulations.