A Data Privacy Day Call to Arms: The Shared Responsibility to Protect Customer Data
Blog Published: 02/22/2022
This blog was originally published by JupiterOne here.Written by Melissa Pereira, JupiterOne. Today, millions of people worldwide are becoming aware of how their personal data is collected, shared, and monetized in our modern digital economy. Studies show that Americans are becoming increasingly ...
Five Surprising Findings From the 2022 Multi-Cloud Security Report
Blog Published: 02/22/2022
This blog was originally published by Valtix here. Written by Erik Kristiansen, Valtix. At the end of last year, Valtix released our first annual 2022 Multi-Cloud Security Report based on an independent research survey of 200 IT leaders. If you haven’t already downloaded your copy, you can do so ...
How CISOs Are Preparing to Tackle 2022
Blog Published: 02/21/2022
This blog was originally published by Microsoft here. Written by Vasu Jakkal, Corporate Vice President, Security, Compliance, Identity, and Management, Microsoft. Looking back over the last year, the security landscape has continued to experience significant change and escalation. Every day, ...
SAP Security Patch Day January 2022: Log4j Causes Record-Breaking Number of HotNews Notes
Blog Published: 02/21/2022
This blog was originally published by Onapsis on January 11, 2022. Written by Thomas Fritsch, Onapsis. Highlights of January SAP Security Notes analysis include:January Summary - 35 new and updated SAP security patches released, including 20 HotNews Notes and six High Priority Notes Information ...
CCSK Success Stories: From a CISO
Blog Published: 02/20/2022
This is part of a blog series interviewing cybersecurity professionals who have earned their Certificate of Cloud Security Knowledge (CCSK). In these blogs we invite individuals to share some of the challenges they face in managing security for cloud computing and how they were able to leverage k...
CSA Summit Coming to Minneapolis, MN
Blog Published: 02/19/2022
Written by Rachel Soanes, Director of Marketing and Communications for CSA MN Chapter BOD Cloud Security Alliance - Minnesota Chapter is excited to announce the first ever regional CSA Midwest Summit coming to Minneapolis, MN on April 5th, 2022. CSA MN is very excited to be co-hosting this event ...
Key Differences Between Legacy vs Cloud-First DLP
Blog Published: 02/18/2022
Written by Amit Kandpal, Director - Customer Success at Netskope The first blog in this series covered some critical and fundamental aspects of DLP transformation programs that are often not fully understood.A simple but effective framework to analyze the key differences between legacy DLP contex...
Leveraging CSA to React to Critical Risks
Blog Published: 02/18/2022
Written by JP Perez-Etchegoyen, CTO, Onapsis On February 8th, 2022, SAP released its SAP Security Notes as part of the monthly cadence of releasing security patches. This last patch Tuesday was noteworthy due to the release of patches for critical, unauthenticated, HTTP exploitable vulnerabilitie...
The Future of Cryptocurrency
Blog Published: 02/17/2022
This blog was originally published by VGS here. Written by Kenneth Geers, PhD, Information Security Analyst at VGS. In 2010, Laszlo Hanyecz paid 10,000 bitcoins for two pizzas. Today, with the price of bitcoin over over $40k, those same coins are worth nearly half a billion dollars. How could a s...
Multi Cloud Security
Blog Published: 02/17/2022
Written by Madhukeshwar Bhat, Director, Chapter Development, CSA Bangalore, and Rob Aragao, Chief Security Strategist, CyberRes “Computing may someday be organized as a public utility just as the telephone system is a public utility”- Prof. John McCarthy at MIT’s centennial celebration in 1961.T...
Ransomware Remains a Dominant Threat to Enterprises in 2022
Blog Published: 02/17/2022
This blog was originally published by BitSight here. Written by Marc Saltzman, Technology Journalist & Podcast Host of Tech It Out. What the disturbing trend means for your organization and third-party vendorsAs we start a new calendar year –nearly 24 months since the global pandemic started ...
The Evolution of Cloud Security in 2022
Blog Published: 02/16/2022
This blog was originally published by G2 here. Written by Aaron Walker, G2. This post is part of G2's 2022 digital trends series.Unified security for the distributed cloudIn the early days of cloud computing, businesses had a simple choice: adopt or don’t. Back then, security was a secondary conc...
New Cloud Security Alliance Report Highlights Factors to Consider When Designing Blockchain Solutions That Operate Within Critical Sectors
Press Release Published: 02/16/2022
Paper provides insights into the three layers of distributed ledger technology and how they interact with enterprise security services to deliver specific security outcomesSEATTLE – Feb. 16, 2022 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards...
From the Trenches: Common-Sense Measures to Prevent Cloud Incidents - Part 2
Blog Published: 02/16/2022
Written by Omri Segev Moyal & Brenton Morris, Profero - Rapid IRIntroduction In part one of this series, we discussed some specific incidents that we at Profero have dealt with in the past and some ways in which attackers can take advantage of cloud environments during an incident. In part t...
Protecting People from Recent Cyberattacks
Blog Published: 02/15/2022
This blog was originally published by Microsoft on December 6, 2021. Written by Tom Burt, Corporate Vice President, Customer Security & Trust, Microsoft. The Microsoft Digital Crimes Unit (DCU) has disrupted the activities of a China-based hacking group that we call Nickel. In documents...
Behind The Buzzword: Four Ways To Assess Your Zero Trust Security Posture
Blog Published: 02/15/2022
This blog was originally published by Lookout here. Written by Hank Schless, Senior Manager, Security Solutions, Lookout. With just about everything delivered from the cloud these days, employees can now collaborate and access what they need from anywhere and on any device. While this newfound fl...
ICMAD: Critical Vulnerabilities in SAP Business Applications Require Immediate Attention
Blog Published: 02/14/2022
This blog was originally published by Onapsis on February 8, 2022. Written by JP Perez-Etchegoyen and the Onapsis Research Labs. Detailed research from the Onapsis Research Labs throughout 2021 around HTTP Response Smuggling led to the recent discovery of a set of extremely critical vulner...
Are You Ready for the Great Cybersecurity RESET?
Blog Published: 02/14/2022
This blog was originally published by CXO REvolutionaries here. Written by Phil Armstrong, EVP & Global CIO (former). Have you heard about the “great cybersecurity RESET” yet? The reset is a new wave of activity and an emerging global trend centered around cybersecurity planning. Businesses a...
What is Cloud Penetration Testing?
Blog Published: 02/12/2022
Written by the CSA Top Threats Working Group. Also known as ethical hacking, cloud penetration testing evaluates security and discovers vulnerabilities by utilizing hacker tools and techniques. Security testing in general is crucial to the security assurance of cloud environments, systems and dev...
The Cyber Defense Matrix
Blog Published: 02/11/2022
This blog was originally published by JupiterOne here. Written by Sounil Yu, CISO & Head of Research, JupiterOne. In a world where cybersecurity threats evolve and proliferate at dizzying speed, a confusing and disordered cybersecurity landscape makes it all too difficult to ensure that our a...