Industry Insights

Read the latest cloud security news, trends, and thought leadership from subject matter experts.

Industry Insights
Introduction to the NIST Cybersecurity Framework
Published: 04/21/2021

This blog was originally published by OpsCompass hereWritten by Kevin Hakanson, OpsCompassSecurity Framework Based on Standards, Guidelines, and PracticesThe NIST Cybersecurity Framework (NIST CSF) was created via a collaboration between the United States government and industry as a voluntary fr...

What an Auditor Should Know about Cloud Computing Part 2
Published: 04/20/2021

Deep Dive into Cloud GovernanceWith the launch of the Certificate of Cloud Auditing Knowledge (CCAK) credential by ISACA and CSA, Moshe Ferber has put together some of the insights gained during the creation of the CCAK. This is the second in a series of three blogs dealing with the essentials an...

Cloud-Native Security 101
Published: 04/19/2021

This blog was originally published by Intezer.The arrival of the cloud has changed the application development process. Agile cloud-native applications have replaced traditional monolithic application architectures, and components are no longer bundled into a single server. This transformation ha...

Why Remote Browser Isolation (RBI), Why Now?
Published: 04/14/2021

This post was originally published on Ericom's blog here.Written by Dr. Chase Cunningham, EricomRemote Browser Isolation, aka RBI, was more of a “fringe” technology when it first came on the scene. I wrote about RBI a few years ago while working as an analyst. At that time, it was noted as someth...

​Developing Key Management Systems
Published: 04/09/2021

Based on a publication written by the Cloud Key Management Working GroupKey management is the management of cryptographic keys in a cryptosystem. A reliable key management system (KMS) helps a business meet compliance and data control requirements, and also benefits the overall security of the or...

​How CCAK Elevates and Impacts Other Credentials
Published: 04/07/2021

Written by Daniele Catteddu, Chief Technology Officer, CSAThe skills gap is not a new topic when it comes to cloud or cybersecurity. Per Flexera's 2020 State of the Cloud report, 59% of enterprises expect cloud usage to exceed prior planned usage due to COVID-19 – which creates a high demand for ...

​Cloud-Native Security Starts with the Cloud
Published: 04/07/2021

Oracle author: Maywun Wong, Director, Product MarketingContributed by: Frank Dickson, IDC, Program Vice President, Security & Trust“Cloud-native security!” is the battle cry of the day. We all want it. But what is it? Everyone seems to define it differently. My suggestion is that any discussi...

What an Auditor Should Know about Cloud Computing Part 1
Published: 04/06/2021

An Introduction to Cloud Terminology and General GovernanceWritten by Moshe Ferber, CCSK and CCAK InstructorThis is the first in a series of three blogs dealing with the essentials an auditor needs to know about cloud computing. In recent years, there has been a strong focus on building cloud pla...

CCSK Success Stories: From a Senior Executive
Published: 04/01/2021

This is part of a blog series interviewing cybersecurity professionals who have earned their Certificate of Cloud Security Knowledge (CCSK). In these blogs we invite individuals to share some of the challenges they face in managing security for cloud computing and how they were able to leverage k...

Beware of Legitimate, but Compromised Websites
Published: 03/30/2021

This blog was originally published by Ericom By Mendy Newman, Group CTO, International, Ericom SoftwareIt’s easy to get lulled into a false sense of security when visiting a website you know – “I navigated directly to xyz.com so I know this isn’t a spoofed site. Surfing here, even downloading thi...

How SDP Can Be Used to Thwart DDoS Attacks
Published: 03/26/2021

By Shamun Mahmud, Senior Research Analyst and Standards Officer for the Cloud Security AllianceSoftware Defined Perimeter provides an integrated security architecture that is otherwise hard to achieve with existing security point products. We’ve seen tremendous growth in interest, enterprise adop...

5 Best Practices for Securing Microsoft Azure
Published: 03/25/2021

This blog was originally published by OpsCompass.By John Grange from OpsCompass.Cloud adoption has led to a major shift in application security management. Unlike on-premises where the focus is more on perimeter security, cloud deployments demand a more holistic and integrated approach. Ensuring ...

Incident Response and Knowing When to Automate
Published: 03/24/2021

This blog was originally published on Vectra.ai Measuring and improving total time of response is easier said than done. The reality is many organizations do not know their existing state of readiness to be able to respond to a cybersecurity incident in a fast, effective manner. And most don’t...

Planning Through Recovery: Five Things to Keep in Mind
Published: 03/23/2021

By Bryan Sartin, Senior Vice President, Chief Services Officer, eSentirePlanning is everything. Just ask the Boy Scouts. While being caught in a downpour without an umbrella is certainly inconvenient, maybe even unpleasant, it pales in comparison to your organization experiencing a significant da...

​Cloud Explosion Catapults Privileged Access Management and Identity Security to the Forefront
Published: 03/22/2021

By Justyna Kucharczak from CyberArk 2020 introduced a host of unexpected challenges for cybersecurity teams. Not only must they protect increasingly complex IT environments, they’re now charged with deploying new models to enable mobile and geographically dispersed workforces. As they move for...

CCAK Testimonials: From a Cybersecurity Consultant
Published: 03/22/2021

The Certificate of Cloud Auditing Knowledge (CCAK) is the first credential available for industry professionals to demonstrate their expertise in the essential principles of auditing cloud computing systems. The CCAK credential and training program will fill the gap in the market for technical ed...

CCSK Success Stories: From an IT Security Consultant
Published: 03/19/2021

This is part of a blog series interviewing cybersecurity professionals who have earned their Certificate of Cloud Security Knowledge (CCSK). In these blogs we invite individuals to share some of the challenges they face in managing security for cloud computing and how they were able to leverage k...

Locking Down the Security of AWS IAM
Published: 03/18/2021

This blog was originally published by Fugue, Inc. By Becki Lee, Head Technical Writer, Fugue, Inc. This blog post helps cloud engineers think more critically about cloud misconfiguration — why it occurs, how malicious actors exploit it, and ways to prevent it. Why AWS IAM? Cloud misconfig...

Investment in Cybersecurity During a Recovering Economy
Published: 03/17/2021

This blog was originally published by TokenEx.Written by Alex Pezold, Co-Founder and CEO at TokenEx.Over a year of economic uncertainty driven by the pandemic has led organizations to re-evaluate their budgets. If one thing is apparent, it is that investing in cybersecurity must be a top priority...

Incident Response and the Need for Speed
Published: 03/16/2021

This blog was originally published on Vectra.ai When a cyberattack occurs, most aspects of the threat are not under the control of a targeted organization. These range from who is targeting them, what is the motivation, where and when the attack occurs, how well-equipped and skilled that attac...

Browse by Topic