Cloud 101CircleEventsBlog
Master CSA’s Security, Trust, Assurance, and Risk program—download the STAR Prep Kit for essential tools to enhance your assurance!

All Articles

All Articles
CAASM Should Be an Early Security Investment in Every CISO’s Playbook

Blog Published: 03/07/2022

This blog was originally published by JupiterOne here. Written by Jasmine Henry, JupiterOne. It’s possible to improve your security posture on a shoestring budget. There are a growing number of open source tools for security and compliance, but there are also key areas to invest in at the beginni...

Key Steps to Follow Before Embarking on Specific DLP Policies

Blog Published: 03/04/2022

Written by Amit Kandpal, Director - Customer Success at Netskope. Make sure to also check out Part 1 and Part 2 of this series. As discussed briefly in the first part of this blog series, it is very important to reduce the risk surface area before jumping into configuring and tuning specific DLP ...

CCSK Success Stories: From a Computer Science Student

Blog Published: 03/04/2022

This is part of a blog series interviewing individuals who have earned their Certificate of Cloud Security Knowledge (CCSK), inviting them to share how they were able to leverage knowledge from the CCSK in their current roles. In this blog, we'll be interviewing Angel Sayani, a 19-year-old develo...

Kubernetes Security Best Practices: Definitive Guide

Blog Published: 03/03/2022

This blog was originally published by ARMO here. Written by Jonathan Kaftzan, VP Marketing & Business Development, ARMO. IntroductionKubernetes, an open-source microservice orchestration engine, is well known for its ability to automate the deployment, management, and, most importantly, scali...

Kraft Heinz CISO Ricardo Lafosse to Headline Cloud Security Alliance Summit at RSA Conference 2022

Press Release Published: 03/03/2022

Registration opens today for CxO Trust Summit, which will explore C-suite’s biggest cloud computing challenges and how CxO Trust Initiative mitigates riskSEATTLE – March 3, 2022 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, ...

DevSecOps Automation

Blog Published: 03/03/2022

Getting to market faster requires top-down, customer-first prioritization Written by Adam Kerns, Managing Principal, Cloud Engineering, Coalfire. This blog is based on Coalfire’s Securerealities report, Smartest Path to DevSecOps Transformation. Automation is on everyone's path to DevS...

The Benefits of Confidential Computing for Government Agencies

Blog Published: 03/02/2022

This blog was originally published by Anjuna here. Government agencies occupy a unique position when it comes to protecting data. Unlike private enterprises, which include proprietary ownership, profitability and competitive advantage in their goals, a government agency is responsible for safegu...

How Zero Trust Security Will Revolutionize DevSecOps

Blog Published: 03/01/2022

This blog was originally published by Appgate here. Written by Kurt Glazemakers, Appgate. Due to the rise of the cloud and containers, software development has made giant steps forward in productivity, agility and scale. DevOps and DevSecOps have created controlled, easily deployable, secure and ...

The Significance of PwnKit to Insider Threats

Blog Published: 03/01/2022

This blog was originally published by Alert Logic here. Written by Josh Davies, Alert Logic. Alert Logic has been covering and tracking PwnKit since its initial discovery, and we’ve developed the appropriate detection and coverage to both determine exposure and identify compromises. PwnKit all...

Build a Stronger Cybersecurity Team Through Diversity and Training

Blog Published: 02/28/2022

This blog was originally published by Microsoft here. Written by Natalia Godyla, Product Marketing Manager, Microsoft Security and Heath Adams, Chief Executive Officer, TCM Security. The security community is continuously changing, growing, and learning from each other to better position the w...

Appraising Operating Effectiveness of Controls for Your SOC 1 or 2 Audit

Blog Published: 02/28/2022

This blog was originally published by CAS Assurance here. OverviewWhether we are dealing with Service Organization Controls (SOC) 1 audit or talking about Service Organization Controls (SOC) 2 audit, the operating effectiveness of controls is of paramount importance. Not only for passing an audit...

Pfizer IP Leak Isn’t Unique. Protect Your Cloud Data With Proactive Encryption.

Blog Published: 02/25/2022

This blog was originally published by Lookout on December 17, 2021. Written by Hank Schless, Senior Manager, Security Solutions, Lookout. The pharmaceutical company Pfizer recently acknowledged that thousands of internal documents were leaked, including trade secrets related to its COVID-19 vacci...

The North Star Your Cloud Strategy Needs

Blog Published: 02/25/2022

This blog was originally published by Booz Allen here. Written by Delie Minaie, Booz Allen. Orient cloud success around mission assuranceAs IT leaders throughout the federal government look to guide their agencies toward enterprise-wide cloud maturity, they are met with endless choices regarding ...

A Thumbprint Almost Ended our Vacation, or GDPR and the Cloud

Blog Published: 02/24/2022

A version of this blog was originally published by ShardSecure here. By Marc Blackmer, ShardSecure. A few years ago, we surprised our youngest with a trip to Florida. We did the whole pickup-from-school-with-our-luggage-in-the-car bit and drove straight to the airport. And there was much rejoic...

Security Service Edge (SSE) Reflects a Changing Market: What You Need to Know

Blog Published: 02/24/2022

This blog was originally published by CXO REvolutionaries here. Written by Sanjit Ganguli, VP Transformation Strategy/Field CTO - Global Enterprise, Zscaler. What the world needs is another acronym in cyber security, said absolutely NO ONE. However, as a former Gartner analyst who helped bring my...

Cybersecurity Nonprofits Form “Nonprofit Cyber” Coalition

Press Release Published: 02/23/2022

Nonprofits that focus on action and tangible results to more effectively collaborate and coordinate to increase efficiency and impact globallyNew York – Feb. 23, 2022 –The world’s leading implementation-focused nonprofit cybersecurity organizations today launched Nonprofit Cyber, a first-of-its-k...

ISO/IEC 27002:2022: Understanding the Update

Blog Published: 02/23/2022

A version of this blog was originally published here. Written by Ryan Mackie, Schellman & Company, LLC. On February 15, 2022, the notification came out that the 2022 version of ISO/IEC 27002 (ISO 27002) was going into publication. ISO standards typically go through a systemic review cycle eve...

NFT vs. Tokenization

Blog Published: 02/23/2022

This blog was originally published by TokenEx here. Written by Valerie Hare, TokenEx. When it comes to tokens, there are a wide range of types and use cases. For instance, people researching NFTs often get search results for other types of tokens and related processes, such as tokenization. Even ...

Healthcare Data Breach Prevention: Take Back Control

Blog Published: 02/23/2022

This blog was originally published by BigID here. Written by Kimberly Steele, BigID. In 2020, the U.S. Department of Health and Human Services Office for Civil Rights (OCR) revealed that healthcare data breach incidents had climbed up to a reported 1.76 per day, marking a 25% increase over report...

Why We Created the Global Security Database

Blog Published: 02/22/2022

The Global Security Database is a modern approach to a modern problem. CVE is an old approach to an old problem, one that still exists (legacy code bases), but has been superseded by new and much more complicated IT systems.Stage 1: We can improve CVE from withinIn the beginning (1999) there was ...

Looking for the CCM?

Start using the Cloud Controls Matrix to simplify compliance with multiple standards & regulations.