Cloud 101
Circle
Events
Blog

Industry Insights

Read the latest cloud security news, trends, and thought leadership from subject matter experts.

Industry Insights
Managing Operational Complexity in Multicloud Environments
Published: 11/29/2022

Written by Sandeep Shilawat, Cloud and IT Modernization Strategist, ManTech. Originally published on Forbes. With the benefits of cloud computing now clear, enterprises are racing to adopt cloud-based infrastructures.According to Synergy Research Group, spending on cloud computing exceeded spendi...

Preventing Hyperjacking in a Virtual Environment
Published: 11/29/2022

Originally published by Entrust. Written by Iain Beveridge and Dave Stevens, Entrust. In the rapidly evolving world of information security, attack vectors, and cyberattacks, there is a regular cadence of new industry terms to grapple with. Hyperjacking is a term you may not have come across. It ...

How to Get CMMC Certified
Published: 11/29/2022

Originally published by Schellman. Written by Todd Connor, Senior Associate, Schellman.For those of you considering CMMC, this new certification affecting contractors in the Defense Industrial Base (DIB) defines three levels—your level of certification will depend on the types of DoD informatio...

4 Important Compliance Management Tasks for Startups
Published: 11/28/2022

Originally published by A-LIGN. The ongoing increase in cyberattacks has emphasized the importance of cybersecurity and compliance management, especially for startups still gaining market share. As startups work to win new customers, they may have to overcome a prospect’s fears that as an organiz...

Password Hash Cracking, User Cloning, and User Impersonation: Three Risks Every SAP Customer Should Know
Published: 11/28/2022

Originally published by Onapsis. Written by Thomas Fritsch, Onapsis. The easiest (and a significantly profitable) way for attackers to get into a system is logging in with valid user credentials. According to a recent report, breaches that are caused by stolen or compromised credentials are not o...

Tailoring Your Zero Trust Transformation to Your Pain Points
Published: 11/28/2022

Originally published by CXO REvolutionaries. Written by Gary Parker, Field CTO - AMS, Zscaler. Zero trust is often likened to a journey. And, as the proverb says, even a journey of a thousand miles begins with a single step.But where to start? For better or for worse, there’s no single embarkatio...

CCSK Success Story: From an IT and Cloud Security Manager
Published: 11/23/2022

This is part of a blog series interviewing cybersecurity professionals who have earned their Certificate of Cloud Security Knowledge (CCSK). In these blogs we invite individuals to share some of the challenges they face in managing security for cloud computing and how they were able to leverage k...

Beating IT’s Bad Rap: How CXOs Can Maintain a Positive Corporate Presence
Published: 11/23/2022

Originally published by CXO REvolutionaries. Written by Gary Parker, Field CTO - AMS, Zscaler. Winston Churchill famously said, “never let a good crisis go to waste.” But, if a CXO only appears in front of the board when trying to keep their job after a cyber incident, a crisis may well lay waste...

How to Use Threat Intelligence to Combat Targeted Attacks
Published: 11/23/2022

Written by Alex Vakulov Threat Intelligence (TI) is one of the most complex and, at the same time, important elements of information security. Threat Intelligence collects information about hacker groups, their techniques and tactics. It provides threat prediction, helps detect attacks, and suppl...

An Interview with One of the Developers of CSA’s Zero Trust Training
Published: 11/22/2022
Author: Megan Theimer

These days, Zero Trust is a term that you can’t seem to get away from - and you shouldn’t want to! Zero Trust is based on the principle that no part of a computing and networking system can be implicitly trusted, including the humans operating it. This concept codifies an evolutionary approach to...

Web 3.0 Security Issues: What Your Company Needs to Know for 2023
Published: 11/22/2022

Originally published by TokenEx. Written by Anni Burchfiel, TokenEx. The world wide web had its first major shift when blogging and forum capabilities were added to web alongside the established collection of static company websites. The ability for anyone to add their own content to the web, tho...

Cloud First, Security Second?
Published: 11/22/2022

Originally published by Thales. Written by Chad Couser, Director, Marketing Communications, Thales. Cloud solutions were a lifesaver for organizations during the height of the COVID-19 pandemic as employees worked remotely or went hybrid and businesses pivoted their technology strategies to keep ...

Removing the Fog from Cloud Compliance
Published: 11/22/2022

Originally published by Axonius. Written by Shlomit Alon, Axonius. “When I was told our company needs to ensure we’re cloud compliant, I was scratching my head, unsure where to begin.”Does that quote sound familiar? A risk analyst at a company wasn’t sure where to reduce risks in the foreboding ...

Diving Deeply into IAM Policy Evaluation – Highlights from AWS re:Inforce IAM433
Published: 11/21/2022

Originally published by Ermetic. Written by Noam Dahan, Ermetic. IAM433 has a good explanation of how and why permissions boundaries can be circumvented by resource policies. There’s a repeat tomorrow but it’s not recorded (chalk talk). This presentation should be made public and linked from ...

Top 5 Configurations to Check When Setting Up a New SaaS App
Published: 11/21/2022

Originally published by Adaptive Shield. Written by Hananel Livneh, Adaptive Shield. The old days of buying new software, installing it on the company servers, and making sure everything works is gone. All hail the new IT king - SaaS platforms. Ready to go from the start, no installation needed, ...

Inoculate Your Company Against Security Data Gaps to Develop Cyber Immunity
Published: 11/21/2022

Written by Arti Raman, CEO and Founder, Titaniam. Protecting sensitive customer data, or personally identifiable information (PII), is a high priority for companies in verticals ranging from financial services to healthcare and retail. Chief information security officers (CISOs) for these ind...

Top Threat #9 to Cloud Computing: Misconfiguration and Exploitation of Serverless and Container Workloads
Published: 11/20/2022

Written by the CSA Top Threats Working Group.The CSA Top Threats to Cloud Computing Pandemic Eleven report aims to raise awareness of threats, vulnerabilities, and risks in the cloud. The latest report highlights the Pandemic Eleven top threats, in which the pandemic and the complexity of workloa...

IoT Vulnerabilities and Security Concerns
Published: 11/19/2022
Author: Megan Theimer

In Part 1 of this blog, we covered the many reasons that Internet of Things (IoT) security is needed and should be properly funded. Now, to help you understand how to design and develop IoT products securely, we will explain some of the challenges security engineers face when dealing with IoT dev...

CSA Chapter Success Story: An Interview with the Japan Chapter Director
Published: 11/19/2022
Author: Megan Theimer

CSA’s chapters are made up of security professionals who volunteer to increase cloud security awareness in their local area and provide outreach for CSA research, education, and training resources. They work to solve cloud vulnerabilities and challenges by collaborating with other local experts i...

The New ISO/IEC 27001:2022 Standard’s Impact on the CSA STAR Certification
Published: 11/18/2022

Written by Ashwin Chaudhary, CEO, Accedere. Introduction The most awaited third edition of ISO/IEC 27001:2022 was published on 25th October 2022, after the publication of ISO 27002:2022 in February 2022. If you are planning on transitioning to the newly updated standard, then your major focus s...

Browse by Topic
Write for the CSA blog
Submit your blog proposal

Sign up to receive CSA's latest blogs

This list receives 1-2 emails a month.