ChaptersCircleEventsBlog

All Articles

All Articles
What Are Cloud Controls?

Blog Published: 03/19/2022

There are many risks associated with cloud computing. Therefore, it’s critical to understand cloud security before attempting to migrate your organization to the cloud.Cloud controls are safeguards or countermeasures that help organizations manage risk in the cloud. Cloud controls can be polic...

Scam and Circumstance

Blog Published: 03/19/2022

If a burglar breaks into your home and steals your TV, the first thing you do is what was taught back in kindergarten: call 911. Within minutes the authorities will arrive at your doorstep and work tirelessly to resolve this. In the digital world, if someone hacks into your computer and steals...

The CSA Triangle Chapter Supports Veterans and Grows Talent in the Triangle

Blog Published: 03/20/2022

The Cloud Security Alliance Triangle Chapter began as a grassroots initiative in 2018 when Eric Hart recognized the need for advancing the mission of cloud security in the Triangle (Raleigh, Durham, Chapel Hill) area of North Carolina.Eric recognized the potential when meeting with Kyle Mitche...

Your Data Is Everywhere: Here Are The Critical Capabilities Of A Modern Data Loss Prevention (DLP)

Blog Published: 03/21/2022

This blog was originally published by Lookout here. Written by Sundaram Lakshmanan, CTO of SASE Products, Lookout. In some ways, IT teams had a great life in the early 2000s. Data was stored inside data centers and accessed through known ingress and egress points like a castle with a limited n...

Five Cloud Security Traps (And How to Avoid Them)

Blog Published: 03/21/2022

This blog was originally published by Vulcan Cyber here. Written by Gal Gonen, Vulcan Cyber. It’s no surprise that one of the biggest concerns for companies using the cloud – whether they were born in the cloud or migrated to one – is the attached security management, specifically when “operat...

The Top 22 Digital Transformation Trends To Look Out For In 2022

Blog Published: 03/22/2022

This blog was originally published by Contino here. Written by Deepak Ramchandani, Contino. 2021 was a big year in the world of digital transformation. The pandemic continued to push businesses to accelerate their digital journeys. From data-driven sustainability initiatives to cloud-first rem...

Data Breach vs Data Exposure

Blog Published: 03/22/2022

This blog was originally published by TokenEx here. Written by Anni Burchfiel, TokenEx. Data breaches have become increasingly common, and costly, as the world continues to work from home. According to CyberTalk in 2021, 36 billion company records were exposed, and data breach costs soared to ...

Financial Sector and Cloud Security Providers Complete Initiative To Enhance Cybersecurity

Press Release Published: 03/23/2022

A joint trade initiative identifies roles and responsibilities between firms and cloud security providers, establishing a mutually beneficial framework for cybersecurity.Seattle —The Cyber Risk Institute (CRI), the Cloud Security Alliance (CSA), and the Bank Policy Institute-BITS announced tod...

To Err is Human, and That is What Hackers are Counting On

Blog Published: 03/23/2022

Originally published January 20, 2022 on Fugue’s website. Written by Josh Stella. Read the first blog in this series here. It’s understandable if you’ve made thwarting ransomware your top cybersecurity priority for 2022. The number of successful ransomware attacks, which encrypt computers ...

The Debate: Should You Build or Buy CAASM?

Blog Published: 03/23/2022

This blog was originally published by JupiterOne here. Written by Jasmine Henry, JupiterOne. Should you build or buy a CAASM solution? It’s a valid question, especially in an ecosystem rich with open source and low-cost security tools. You don’t need enterprise software to create API integrati...

Ownership, Control and Possession – Options for Key Management in the Cloud

Blog Published: 03/24/2022

This blog was originally published by Entrust here. By Iain Beveridge, Senior Product Marketing Manager, Data Protection Solutions at Entrust. My favourite scene from mid-80’s movie Ferris Bueller’s Day Off, was when Ferris (Matthew Broderick) and his friends roll into a rather shady looking...

Adopting AI-based Attack Detection

Blog Published: 03/24/2022

This blog was originally published by LogicHub here. Written by Willy Leichter, Chief Marketing Officer, LogicHub. The security industry is long-overdue for real innovation with the practical application of emerging technologies around automation, machine learning, and artificial intelligence ...

Cloud and Sovereignty: Are They Compatible?

Blog Published: 03/24/2022

This blog was originally published by Atos here. Written by Frederic Malicki, Pierre Brun-Murol, and Dominique Michiels. In a period where moving to cloud and sovereignty are becoming central for many companies and institutions — especially in Europe — let’s take a moment to examine the appare...

Cyber Attacks in Russia’s Invasion of Ukraine

Blog Published: 03/25/2022

This blog was originally published by Orca Security on March 11, 2022. Written by Bar Kaduri, Orca Security. The modern internet has drastically changed the landscape of threats. It created a new dimension where countries and individuals can affect, disrupt and demolish systems that comprise o...

Hey You, Get Out of My Cloud!

Blog Published: 03/25/2022

Written by Jim Mandelbaum, Gigamon Field CTO When we take a cloud solution to production how do we know who has access to that data? The process of deploying the production environment has certainly involved several groups and individuals. Who still has access and what can they do with it?...

Amazon Ring: A Case of Data Security and Privacy

Blog Published: 03/26/2022

This case study is based off of CSA’s Top Threats to Cloud Computing: Egregious Eleven Deep Dive. The Deep Dive connects the dots between CSA Top Threats through the use of nine real-world attacks and breaches. Pulling from one of the case studies, this article provides a security analysis ove...

Data Discovery: A Means to an End or an End to a Means?

Blog Published: 03/28/2022

This blog was originally published by BigID here. Written by Alan Dayley, BigID. When it comes to data management and data governance, “data discovery” has historically been a vague term. Is it simply the ability to connect and create an inventory of an enterprise’s data assets — or is there m...

Kubernetes for Beginners – A Step-by-Step Guide

Blog Published: 03/28/2022

This blog was originally published by Vulcan Cyber here. Written by Natalie Kriheli, Vulcan Cyber. For beginners, Kubernetes can seem pretty daunting. It offers a feature-rich, flexible, and extensible platform, but the downside is that Kubernetes security can be quite challenging. Any misconf...

7 Technology Innovations That Will Impact Cybersecurity in 2022 and Beyond

Blog Published: 03/27/2022

Cloud has become the foundation for launching new technologies. As these new technologies are developed and adopted by enterprises, they will increasingly impact cybersecurity. Help our industry start preparing for the future by informing yourself of the top emerging technologies to watch for....

When It Comes to SaaS Security, Ignorance is Not Bliss for Corporate Leadership

Blog Published: 03/29/2022

Written by Brendan O’Connor, CEO and Co-Founder of AppOmni Organizations are increasingly moving their data to SaaS platforms. But while companies are racing to adopt SaaS, many haven’t yet put the tools and processes in place to protect their SaaS data, leaving it vulnerable in the cloud....

Looking for the CCM?

Start using the Cloud Controls Matrix to simplify compliance with multiple standards & regulations.