Register for CSA’s SECtember conference and trainings today




Circle
Events
Blog

Industry Insights

Read the latest cloud security news, trends, and thought leadership from subject matter experts.

Industry Insights
Your Guide to FedRAMP Pen Test Guidance 3.0
Published: 09/16/2022

Originally published by Schellman here. Written by Josh Tomkiel, Schellman. For the first time since 2017, the FedRAMP Project Management Office (PMO) has updated the Penetration Testing Guidance document. For Cloud Service Providers (CSPs) seeking FedRAMP Authority to Operate (ATO), that’s ...

ZTNA vs VPN – How to Burst a Cyber Myth
Published: 09/16/2022

Originally published by Skyhigh Security here. Written by Vishwas Manral, Chief Technologist & Head of Cloud Native Security, Skyhigh Security. I hear a lot of myths about what Zero Trust Network Access (ZTNA) is and how it compares to VPN. Some of it is true, and a lot of it is far from the trut...

Cryptominer Detection: A Machine Learning Approach
Published: 09/15/2022

Originally published by Sysdig here. Written by Flavio Mutti, Sysdig. Cryptominers are one of the main cloud threats today. Miner attacks are low risk, low effort, and high reward for a financially motivated attacker. Moreover, this kind of malware can pass unnoticed because, with proper evasive ...

Securing Our Nation: How the Infrastructure Investment and Jobs Act Delivers on Cyber Resiliency
Published: 09/15/2022

Originally published by CrowdStrike here. Written by Jeff Worthington, CrowdStrike. Designed to improve our nation’s critical infrastructure, the act is one of the largest federally funded grant programs in history. It provides significant funding to improve your cybersecurity posture so you can ...

How Long Does It Take to Complete a SOC 2 Audit?
Published: 09/15/2022

Originally published by A-LIGN here. Written by Stephanie Oyler, Vice President of Attestation Services, A-LIGN. A SOC 2 report is a third-party validation that attests to an organization’s ability to protect data and information. It’s widely accepted across industries and provides a singular ass...

Your Cloud Footprint is Growing: Here’s How to Scale Cloud Governance
Published: 09/14/2022

Written by Umair Khan, Marketing Director, Stacklet For today’s businesses, cloud footprints have grown—and keep getting larger. Increasingly, that means many teams and departments are running implementations across multiple cloud providers, services, and regions. From a cloud governance or polic...

Insider Risk Management: Security Starts Within
Published: 09/14/2022

Originally published by DoControl here. Written by Corey O'Connor, DoControl. When it comes to addressing insider risk, security starts within. Protecting sensitive company data from exfiltration and misuse requires a combination of the right people, process, and technology. Managing insider risk...

Verizon’s 2022 Mobile Security Index Report – Confirming What We All Suspected
Published: 09/14/2022

Originally published by Thales here. Written by Todd Moore, VP, Encryption Products, Thales.What happens when you combine a pandemic that forces most businesses into a remote work environment, coupled with increased mobile device use for many daily tasks? On the one hand, you get increased produc...

Edge Computing and IoT: Security Through Zero Trust
Published: 09/13/2022

Originally published by CXO REvolutionaries here. Written by Bryan Green, Chief Information Security Officer, Zscaler. Though they're often used interchangeably, internet of things (IoT) and operational technology (OT) refer to adjacent but fundamentally different technologies. Both share common ...

How to Leverage the NIST Framework for a More Effective SAP Security Strategy
Published: 09/13/2022

Originally published by Onapsis here.Business applications like SAP are responsible for running the enterprise, powering operations and fueling the global economy. Considering 77% of the world’s transactional revenue touches an SAP system and 92% of the Forbes Global 2000 uses SAP, a successful a...

Challenges of Cloud Security (5 Traps to Avoid)
Published: 09/12/2022

Originally published by Vulcan Cyber here. Written by Gal Gonen, Vulcan Cyber. It’s no surprise that one of the biggest concerns for companies using the cloud - whether they were born in the cloud or migrated to one - is the attached challenges of cloud security, specifically when “operating in t...

How Identifying UserData Script Manipulation Accelerates Investigation
Published: 09/12/2022

Originally published by Mitiga here. Written by Doron Karmi, Mitiga. UserData script manipulation by threat actors is a technique that has been known in the wild for several years and has been observed being exploited by many attack groups. Abuse of the AWS EC2 instance UserData attribute could l...

How to Protect Your Data When Ransomware Strikes
Published: 09/12/2022

Originally published by Lookout here. Written by Hank Schless, Senior Manager, Security Solutions, Lookout. Ransomware is not a new attack vector. In fact, the first malware of its kind appeared more than 30 years ago and was distributed via 5.25-inch floppy disks. To pay the ransom, the victim h...

Crypto Done Right
Published: 09/09/2022

Written by Debra Baker Ever wonder what cryptographic algorithms to use? What is better for symmetric encryption, AES-CTR or AES-CBC? For that matter what is symmetric encryption. Is ECDSA or RSA better for encryption? It can quickly get confusing. In fact, there was a study done on the Usabili...

The Credential Theft Food Chain - How Does a Bad Actor Move Laterally Once In?
Published: 09/09/2022

Written by Anastasios Arampatzis, Tech Writer, Bora Any time a breach occurs, senior management and any subsequent media coverage often focus on how the criminal got into the network. Most company leadership would like to imagine that the breach resulted from a sophisticated, lengthy campaign to ...

In Zero We Trust: Cultivating a Zero Trust Strategy
Published: 09/08/2022

Written by Prakhar Singh, Business Development Manager, Cybersecurity & GRC Services, HCL Technologies and Sahil Pathak, Technology Evangelist. Introduction When one thinks about IT network and security, the first thing that comes to mind is the traditional de-militarized zones or the hub and spo...

Why Securing Internet-Facing Applications is Challenging in a Kubernetes Environment
Published: 09/08/2022

Originally published by Tigera here. Written by Ratan Tipirneni, Tigera. Internet-facing applications are some of the most targeted workloads by threat actors. Securing this type of application is a must in order to protect your network, but this task is more complex in Kubernetes than in traditi...

GitOps and Shift Left Security: The Changing Landscape of DevSecOps
Published: 09/07/2022

Originally published by CrowdStrike here. Written by David Puzas, CrowdStrike. Application developers have always had a tricky balance to maintain between speed and security, two requirements that may often feel at odds with each other. Practices that increase speed also pressure development team...

Are Conventional Cybersecurity Tactics Leading You to Defeat?
Published: 09/07/2022

Originally published by CXO REvolutionaries here. Written by Daniel Ballmer, Senior Transformation Analyst, Zscaler. Today’s organizations are fighting cyberattacks using strategies that have historically failed in a combat environment. While there are many differences between conventional warfar...

The Standout Cybersecurity Stats You Need to Know
Published: 09/07/2022

Find Part 1 of this blog, "Trends in Cybersecurity Breaches," here. The complete blog was originally posted by Alert Logic on July 7, 2022. Written by Antonio Sanchez. How rampant is cybercrime today? The prevalence of cybercrime is enormous. More than one-third of organizations have experien...

Browse by Topic
Write for the CSA blog
Submit your blog proposal

Sign up to receive CSA's latest blogs

This list receives 1-2 emails a month.