Industry Insights

Read the latest cloud security news, trends, and thought leadership from subject matter experts.

Industry Insights
CCAK Testimonials: From an Audit and Compliance Expert
Published: 05/13/2021
Author: Michael Roza

The Certificate of Cloud Auditing Knowledge (CCAK) is the first credential available for industry professionals to demonstrate their expertise in the essential principles of auditing cloud computing systems. The CCAK credential and training program fills the gap in the market for technical educat...

How to Ensure Data Protection in Multi-Cloud
Published: 05/12/2021

This blog was originally published by CyberCrypt here.Multi-cloud setups pose a handful of challenges: data ownership, control and responsibility are shared among different CSPs and different regions, leaving open the door to misconfigurations and increasing the attack surface available to malici...

Understanding the OWASP API Security Top 10
Published: 05/11/2021

By Sekhar Chintaginjala (This blog originally appeared on CloudVector) As organizations embrace digital transformation initiatives, they are increasingly consuming and exposing APIs that increase their risk surface. The OWASP API Security Top 10 focuses on the strategies and solutions to un...

Security Spotlight: US Government Agencies Take Action Against Exchange Vulnerabilities and Social Media Giants Leak Data
Published: 05/10/2021

This article was originally published by Bitglass hereWritten by Jeff Birnbaum, BitglassHere are the top security stories from recent weeks. FBI Removes Web Shells from Compromised Exchange Servers Without Notifying OwnersCISA Requires Federal Agencies to Patch Exchange Servers for Vulnerabilitie...

CCAK Testimonials: From a Cloud Security Expert
Published: 05/06/2021
Author: Moshe Ferber

The Certificate of Cloud Auditing Knowledge (CCAK) is the first credential available for industry professionals to demonstrate their expertise in the essential principles of auditing cloud computing systems. The CCAK credential and training program fills the gap in the market for technical educat...

Application Container Security: Risks and Countermeasures
Published: 05/05/2021

Written by Suria VenkataramanVirtualizations enable isolated, virtualized views of the operating systems (OS) to each application. Today’s OS virtualization technologies are primarily focused on providing a portable, reusable, and automatable way to package and run applications as containers-base...

And Again About 5G Network Security
Published: 05/04/2021

Written by David Balaban5G network capabilities go beyond the highest ever speed of mobile internet connection. The new mobile communication standard can become a universal infrastructure for interaction between people, smart devices, organizations, and even the economy's sectors.Such total conne...

Cloud Security for SaaS Startups Part 2: Application & Platform Security
Published: 05/03/2021

Based on the Cloud Security for Startups guidelines written by the CSA Israel ChapterAs a SaaS startup, how can your organization ensure you implement proper security for your applications and platforms? In this blog we provide a preview of the information and guidelines available in the Cloud Se...

A New Resource for API Security Best Practices
Published: 04/30/2021

The applicative infrastructure is becoming more and more complex due to different requirements, design patterns, and technologies. In many of these cases, one of those requirements is to connect other parties to systems, and in other cases, to connect systems to other parties. Nowadays, the most ...

Six Key Characteristics of a Modern Secure Web Gateway
Published: 04/29/2021

This blog was originally published by Bitglass here.As we head into the second quarter of 2021 and mark a full year of remote work for many organizations, it is clear that the COVID-19 pandemic has accelerated digital transformation globally and changed the future of work — likely permanently. A ...

What an Auditor Should Know about Cloud Computing Part 3
Published: 04/27/2021
Author: Moshe Ferber

With the launch of the Certificate of Cloud Auditing Knowledge (CCAK) credential by ISACA and CSA, Moshe Ferber has put together some of the insights gained during the creation of the CCAK. This is the third in a series of three blogs dealing with the essentials an auditor needs to know about clo...

How to Secure Cloud Non-Native Workloads
Published: 04/26/2021

This blog was originally published by Intezer here.Not All Applications are Cloud-NativeCompanies are adopting cloud at a faster pace but not all applications are born cloud-native. Many traditional applications are simply “lifted and shifted” to the cloud as a first step in the cloud transformat...

CCAK Testimonials: From a Cybersecurity Architect
Published: 04/22/2021

The Certificate of Cloud Auditing Knowledge (CCAK) is the first credential available for industry professionals to demonstrate their expertise in the essential principles of auditing cloud computing systems. The CCAK credential and training program fills the gap in the market for technical educat...

Introduction to the NIST Cybersecurity Framework
Published: 04/21/2021

This blog was originally published by OpsCompass hereWritten by Kevin Hakanson, OpsCompassSecurity Framework Based on Standards, Guidelines, and PracticesThe NIST Cybersecurity Framework (NIST CSF) was created via a collaboration between the United States government and industry as a voluntary fr...

What an Auditor Should Know about Cloud Computing Part 2
Published: 04/20/2021

Deep Dive into Cloud GovernanceWith the launch of the Certificate of Cloud Auditing Knowledge (CCAK) credential by ISACA and CSA, Moshe Ferber has put together some of the insights gained during the creation of the CCAK. This is the second in a series of three blogs dealing with the essentials an...

Cloud-Native Security 101
Published: 04/19/2021

This blog was originally published by Intezer.The arrival of the cloud has changed the application development process. Agile cloud-native applications have replaced traditional monolithic application architectures, and components are no longer bundled into a single server. This transformation ha...

Why Remote Browser Isolation (RBI), Why Now?
Published: 04/14/2021

This post was originally published on Ericom's blog here.Written by Dr. Chase Cunningham, EricomRemote Browser Isolation, aka RBI, was more of a “fringe” technology when it first came on the scene. I wrote about RBI a few years ago while working as an analyst. At that time, it was noted as someth...

​Developing Key Management Systems
Published: 04/09/2021

Based on a publication written by the Cloud Key Management Working GroupKey management is the management of cryptographic keys in a cryptosystem. A reliable key management system (KMS) helps a business meet compliance and data control requirements, and also benefits the overall security of the or...

​How CCAK Elevates and Impacts Other Credentials
Published: 04/07/2021

Written by Daniele Catteddu, Chief Technology Officer, CSAThe skills gap is not a new topic when it comes to cloud or cybersecurity. Per Flexera's 2020 State of the Cloud report, 59% of enterprises expect cloud usage to exceed prior planned usage due to COVID-19 – which creates a high demand for ...

​Cloud-Native Security Starts with the Cloud
Published: 04/07/2021

Oracle author: Maywun Wong, Director, Product MarketingContributed by: Frank Dickson, IDC, Program Vice President, Security & Trust“Cloud-native security!” is the battle cry of the day. We all want it. But what is it? Everyone seems to define it differently. My suggestion is that any discussi...

Browse by Topic