Industry Insights

Read the latest cloud security news, trends, and thought leadership from subject matter experts.

Industry Insights
Cloud Penetration Testing the Capital One Breach

Published: 10/10/2019

By Alexander Getsin, Lead Author for Cloud Penetration Testing PlaybookAligning the Capital One breach with the CSA Cloud Penetration Testing PlaybookIn March 2019, Capital One suffered a unique cloud breach. 140,000 Social Security numbers and 80,000 linked bank account numbers were exposed, alo...

It's all about the Data! - Preventative Security

Published: 10/08/2019

By John DiMaria, Assurance Investigatory Fellow, Cloud Security AllianceI have always said I am a "data guy." Decisions made with data eliminate all bias, opinions, and ad hoc decisions that cause potential costly moves.In my most recent podcast interview with Phillip Merrick, CEO of Fugue, he di...

Guardians of the Cloud: The Latest Security Findings

Published: 10/07/2019

By Juan Lugo from BitglassWith the emergence of cloud adoption and BYOD in the workplace, companies are experiencing an overwhelming amount of data breaches. This is largely because they are not taking the appropriate steps to secure data in the cloud. As such, Bitglass conducted a survey with IT...

Why you can't have backdoored crypto that is secure

Published: 10/03/2019

By Kurt Seifried, Chief Blockchain Officer, CSASo as you have probably seen some parts of the US government are again making noise about end-to-end encryption. We’ve seen this before (clipper chip, key escrow, etc., etc.). The new twist is that they appear to be trying a thin end of the wedge app...

What to Expect at the 2019 Colorado Chapter Forum

Published: 10/02/2019

Understanding the complexities of cloud security can be very challenging. Because of this, Cloud Security Alliance has membership opportunities, resources, certifications, and local chapters to help explain it. The Colorado Chapter of Cloud Security Alliance is pleased to announce its 4th annual ...

Cloud Security Posture Management: Why You Need It Now

Published: 10/01/2019

By Samantha Nguyen, Product Manager, BitglassGartner recommends that security and risk management leaders invest in CSPM (cloud security posture management) processes and tools to avoid misconfigurations that can lead to data leakage. Although it is a relatively new class of tools, this recommend...

How Blockchain Might Save Us All

Published: 09/27/2019

By Kurt Seifried, Chief Blockchain Officer, CSAI’ve been seeing a lot of articles claiming that Blockchain will save us from hackers, and ransomware, and all sorts of other Cyber-Shenanigans. So… will Blockchain save us all? Yes, well . . . sort of, it’s complicated. Let’s start with a story:The ...

Announcing the [email protected] San Francisco 2019 Agenda

Published: 09/25/2019

By the HackerOne Team The agenda for the third annual hacker-powered security conference, [email protected] San Francisco, is live! [email protected] is the only conference dedicated to the booming hacker-powered security industry, where hackers and leaders come together to build a safer internet. The confer...

The Three Essential Requirements for Securing IaaS

Published: 09/23/2019

By Will Houcheime, BitglassIn today's cloud-first world, organizations have been utilizing infrastructure as a service (IaaS) to better benefit their operations. Using tools like AWS, GCP, or Azure allows organizations to focus on business growth, as well as gain flexibility, scalability, and cos...

Sidechains, beacon chains and why we shouldn’t give up on Blockchain performance quite yet

Published: 09/18/2019

By Kurt Seifried, Chief Blockchain Officer, CSAIf you’ve been in IT you’ve probably learned one of the simple lessons:Scaling out is hard and can be expensive, but scaling up is easy and even more expensive. In simple terms if you can scale out you can keep costs down, ideally at a linear growth ...

CAIQ V3 Updates

Published: 09/17/2019

Cloud Security Alliance (CSA) would like to present the next version of the Consensus Assessments Initiative Questionnaire (CAIQ) v3.1.The CAIQ offers an industry-accepted way to document what security controls exist in IaaS, PaaS, and SaaS services, providing security control transparency. It pr...

The Four Pillars of CASB: Data Protection

Published: 09/16/2019

By Will Houcheime, Product Marketing Manager, BitglassIn this blog series, we discuss the key capabilities of cloud access security brokers (CASBs), and why organizations are turning to them as they migrate to the cloud. One of the four pillars of CASBs is data protection, which focuses on securi...

Egregious 11 Meta-Analysis Part 3: Weak Control Plane and DoS

Published: 09/12/2019

By Victor Chin, Research Analyst, CSAThis is the third blog post in the series where we analyze the security issues in the new iteration of the Top Threats to Cloud Computing report. Each blog post features a security issue that is being perceived as less relevant and one that is being perceived ...

Open API Survey Report

Published: 09/11/2019

By the Open API CSA Working GroupCloud Security Alliance completed its first-ever Open API Survey Report, in an effort to see exactly where the industry stood on the knowledge surrounding Open APIs as well as how business professionals and consumers were utilizing them day to day. The key traits ...

Cloud Security Roadmap for 2019 & Beyond

Published: 09/10/2019

By Amélie Darchicourt, Product Marketing Manager, ExtraHopHow to succeed under the shared responsibility modelCloud security is an evolving space where consumers and vendors must innovate quickly, not only to outpace attackers, but also to support rapid development while minimizing the risks pre...

What Executives Should Know About the Capital One Breach

Published: 09/09/2019

By Phillip Merrick, CEO of FugueMost enterprises are already using public cloud computing services at scale or are planning to adopt the cloud soon. As an executive, chances are you’re paying attention to the Capital One data breach and wondering how this event should impact your decision-making....

How to Share the Security Responsibility Between the CSP and Customer

Published: 09/05/2019

By Dr. Kai Chen, Chief Security Technology Officer, Consumer BG, Huawei Technologies Co. Ltd. The behemoths of cloud service providers (CSPs) have released shared security responsibility related papers and articles, explaining their roles and responsibilities in cloud provisioning. Althou...

Security Spotlight: iPhones Susceptible to a Hack via Text

Published: 09/04/2019

By Juan Lugo, Product Marketing Manager at Bitglass Here are the top stories of recent weeks:   iPhones Susceptible to a Hack via TextDemocratic Senate campaign group exposed emails of 6.2 million AmericansState Farm says Hackers Successfully Conducted a Credentials Stuffing Attack96 Mill...

Egregious 11 Meta-Analysis Part 2: Virtualizing Visibility

Published: 08/28/2019

By Victor Chin, Research Analyst, CSAThis is the second blog post in the series where we analyze the security issues in the new iteration of the Top Threats to Cloud Computing report. Each blog post features a security issue that is being perceived as less relevant and one that is being perceived...

On-Chain vs Off-Chain governance. What are the rules to Calvinball?

Published: 08/26/2019

By Kurt Seifried, Chief Blockchain Officer, CSAIf you don’t know what Calvin and Hobbes is you can skip the next bit, but it is amusing. Calvinball is a game invented by Calvin and Hobbes. Calvinball has no rules; the players make up their own rules as they go along, making it so that no Calvinba...

Browse by Topic