Cloud 101CircleEventsBlog

All Articles

All Articles
Why Cloud-Ready, Centralized AppSec Must Underpin State Government Cloud Adoption

Blog Published: 11/17/2021

This blog was originally published by Checkmarx here. Written by Rebecca Spiegel, Checkmarx. State and local governments are accelerating their use of the cloud as they focus on delivering more digital services with fewer resources and continue responding to pandemic pressures. In a recent Fe...

Data Security and Privacy-related ISO/IEC Certifications

Blog Published: 11/17/2021

Written by Ashwin Chaudhary, CEO of Accedere. In this blog, we will focus on Data Security and Privacy-related ISO/IEC Certifications. With the cybercrime market targeting 10.5 Trillion USD and increasing data security breaches, the need for third-party vendor certifications is also increasin...

Multi-Cloud Security: What You Need to Know

Blog Published: 11/16/2021

This blog was originally published by Vulcan Cyber here. Written by Orani Amroussi, Vulcan Cyber. The multi-cloud approach is becoming increasingly popular among companies looking to take advantage of its agility, innovation, potential cost savings, and the flexibility to choose the best of what ...

Two Truths and a Lie About Cloud Security

Blog Published: 11/15/2021

This blog was originally published by JupiterOne here. Written by Ashleigh Lee, JupiterOne. Cloud technology saved many businesses from catastrophe during this past year, but it’s also introduced additional challenges to security, compliance, and governance practices. The pandemic, with the s...

3 Tenets For High-Performance Cloud Operations

Blog Published: 11/15/2021

This blog was originally published by Booz Allen here. Written by Osama Malik, Booz Allen Hamilton. Unlock enterprise resilience, scale, and flexibilityThese days, with technology progressing at a rapid, continuous, unrelenting clip, cloud capabilities offer federal agencies a way to achieve and ...

CCSK Success Stories: From a Manager of Cloud Infrastructure

Blog Published: 11/14/2021

This is part of a blog series interviewing cybersecurity professionals who have earned their Certificate of Cloud Security Knowledge (CCSK). In these blogs we invite individuals to share some of the challenges they face in managing security for cloud computing and how they were able to leverage k...

What is the Difference Between Software Defined Perimeter and Zero Trust?

Blog Published: 11/13/2021

Written by the CSA SDP and Zero Trust Working Group Summary: After reading this blog you’ll understand what Zero Trust is, the problems it helps solve, and the basics around what implementing Zero Trust looks like using SDP. What is Zero Trust? “Zero Trust” changes how network access works; as th...

How the Incident Response Lifecycle Changes for Cloud

Blog Published: 11/13/2021

Incident Response (IR) is a critical facet of any information security system. Most organizations have some sort of IR plan to govern how they will investigate an attack, but as the cloud presents distinct differences in both access to forensic data and governance, organizations must consider how...

Einstein’s Wormhole: Capturing Outlook & Google Calendars via Salesforce Guest User Bug

Blog Published: 11/12/2021

This blog was originally published by Varonis here. Written by Nitay Bachrach, Varonis. If your organization uses Salesforce Communities and Einstein Activity Capture, you might have unknowingly exposed your administrator’s Outlook or Google calendar events to the internet due to a bug called Ein...

Why Should Enterprises Move to a Zero-Trust Model?

Blog Published: 11/12/2021

This blog was originally published by Unbound Security here. Written by Lior Levy, Unbound Security. Refer to Unbound Security's webinar on November 18, 2021 for more information about the security of cryptographic keys, which is discussed later in this blog. The introduction of new norms such as...

5 Best Practices to Reduce the Attack Surface in the Cloud

Blog Published: 11/10/2021

This blog was originally published by Virsec here. Written by Matt Ambroziak, Virsec. Over the last 18 months the cloud has gone mainstream. In case you need proof, Gartner forecasts end-user spending on public cloud services to grow 23.1% in 2021 to total $332.3 billion, up from $270 billion...

Making the Security Conversation More “Feature-Driven”

Blog Published: 11/10/2021

This blog was originally published by Adobe here. Written by Sandhya Narayan, Principal Program Manager, Adobe. A constantly changing security landscape driven by increasingly persistent threats, growing attack sophistication, and tighter compliance requirements keeps both security and product...

New Cloud Security Alliance Guidance Provides Framework for Protecting Critical Healthcare Systems While Taking Risk to Patient Safety Into Account

Press Release Published: 11/09/2021

Paper from IoT Working Group highlights the importance of not treating medical device incident response as a one-size-fits-allSEATTLE – Nov. 9, 2021 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and best practices to help en...

What is Gartner’s SASE Model, and How Will it Affect Your Cloud Security Stack?

Blog Published: 11/09/2021

By Chloe Whitaker Originally Published by Cisco on August 31, 2021 The way we think about networking and cybersecurity has changed dramatically in recent years. The rise of remote workers, coupled with the growing push of company data and infrastructure into the cloud, prompted Gartner to outli...

Security Spotlight: Critical Vulnerability Exploits and Patches, Plus Novel Attack Tactics

Blog Published: 11/09/2021

This blog was originally published by Bitglass here. Written by Jeff Birnbaum, Bitglass. Here are the top security stories from September 2021: Cisco Patches Three Critical Vulnerabilities Impacting Wireless Controllers and SD-WAN.Critical VMware vCenter Vulnerability Exploited in the WildNew APT...

What Are the Security Challenges with BYOK for Hybrid Cloud Users?

Blog Published: 11/08/2021

This blog was originally published by Unbound Security here. Written by Lior Levy, Unbound Security. Refer to Unbound Security's webinar on November 18, 2021 for more information about key management and cryptography.Moving to the cloud usually brings several advantages, such as flexibility, scal...

From the Trenches: 4 Cloud Security Lessons from Aon’s Chief Security Officer Anthony Belfiore

Blog Published: 11/08/2021

This blog was originally published by Wiz here. Written by Josh Dreyfuss, Wiz. Cloud has driven innovation and agility for organizations, but for security teams it has also brought new levels of complexity around people, processes, and technology. Today’s elastic cloud environments have intr...

5 Tips on How To Build a Great Cloud Migration Roadmap

Blog Published: 11/08/2021

Written by Susan Craig Just like any other complex project, cloud migration implies much more than just moving workloads. Its successful application allows companies to enhance the workflow, increase agility and boost the process's efficiency. Furthermore, that’s a great solution for setting up a...

More on Targeted Attacks and How to Protect Against Them

Blog Published: 11/05/2021

Written by Alex Vakulov. Small and big organizations often face targeted attacks. APT (Advanced Persistent Threat) groups improve the quality of their operations, causing more serious damage. Timely detection and response, training of personnel, and advanced training of information security depa...

Why Your Organization Needs Cyber Insurance

Blog Published: 11/05/2021

This blog was originally published by SafeBase here. Written by Kevin Qiu, Director of Information Security at SafeBase. Security Incidents Are Becoming Increasingly Expensive Cyber security products and defensive techniques have come a long way over the past few years as cloud computing has t...

Looking for the CCM?

Start using the Cloud Controls Matrix to simplify compliance with multiple standards & regulations.