Industry Insights

Read the latest cloud security news, trends, and thought leadership from subject matter experts.

Industry Insights
Data Discovery to Rescue Historical Data from Compliance Violations

Published: 07/01/2020

By Ishani Sircar, Product Marketing Manager at CipherCloudAs technology evolved and the world migrated to the cloud, the amount of data in the cloud increased at a rapid pace and most organizations in trying to keep pace overlooked security best practices. Organizations are sitting on tons of hi...

United States–Mexico–Canada Agreement: Digital Trade Provisions: NAFTA 2.0 meets the Internet

Published: 06/30/2020

By Francoise Gilbert, DataMinding, Inc.The United States–Mexico–Canada Agreement (USMCA) enters into effect on July 1, 2020. Nicknamed “NAFTA 2.0” because it replaces the North America Free Trade Agreement (NAFTA), the USMCA addresses a number issues that had not been tackled by its predecessor, ...

How to secure cloud-based collaboration, emails, and messaging apps

Published: 06/23/2020

By Ishani Sircar, Product Marketing Manager at CipherCloudWe can secure information across multiple enterprise cloudsData leaks. Data breaches. Tighter security controls. Yet more breaches. A continuing cat-and-mouse-game. As both the way we do business in a distributed environment and apps matur...

3 Big Amazon S3 Vulnerabilities You May Be Missing

Published: 06/18/2020

By Drew Wright, Co-Founder Fugue, Inc. When there’s a data breach involving Amazon Web Services (AWS), more often than not it involves the Amazon S3 object storage service. The service is incredibly popular. Introduced way back in 2006 when few knew what the cloud was, S3 is highly scalable, reli...

Five Step UEBA to Detect and Stop Insider Attacks

Published: 06/16/2020

By Ishani Sircar, Manager, Product Marketing at CipherCloudEvery year, more than 34% of businesses worldwide are affected by insider threats. (Source: Sisa Infosec)Despite various investments in security, most organizations are still susceptible to data breaches due to bad actors. The losses fro...

The Octopus Scanner Malware: Attacking the open source supply chain

Published: 06/10/2020

By Alvaro Muñoz at GitHubSecuring the open source supply chain is an enormous task. It goes far beyond a security assessment or just patching for the latest CVEs. Supply chain security is about the integrity of the entire software development and delivery ecosystem. From the code commits themselv...

New Data Protection Law Enacted in Dubai Emirate

Published: 06/08/2020

By Francoise Gilbert, Cybersecurity and Privacy Expert, Cloud Security AllianceDubai has enacted a new data protection law that replaces the current privacy law, law N. 1 of 2007. The new 50-page law, which modernizes the current data protection law, will come into effect on July 1, 2020, at whic...

Detect and Track Threats Through UEBA and Incident Governance

Published: 06/02/2020

By Ishani Sircar, Product Marketing Manager at CipherCloudThe Rise of the Unmanaged DevicesMost organizations are predicting an increased remote workforce and adoption of SaaS apps in the coming years. Remote work environments have led to a rapid adoption of data sharing and collaboration apps, B...

Cloud Cybersecurity and the Modern Applications (part 3)

Published: 05/28/2020

By Francesco Cipollone, Chair at Cloud Security Alliance UK Chapter and Director at NSC42 Ltd.Hybrid Patterns in AzureIn new cloud deployment, it is common to see organizations using a combination of multiple cloud environments or methodologies. Managing access control in a single appliance is al...

Cloud Cybersecurity and the Modern Applications (part 2)

Published: 05/27/2020

By Francesco Cipollone, Chair at Cloud Security Alliance UK Chapter and Director at NSC42 Ltd. Use cases and common pitfallsSecurity appliance vendors are still updating their appliances to include typical cloud architecture that integrates into the cloud provider fabric more efficiently. Some ot...

Pen Testing in the Age of Cloud

Published: 05/26/2020

By Josh Stella, CTO and co-founder of FugueLately, we at Fugue have been demonstrating live hacks against cloud infrastructure based on real events in the news. We often walk through a theft of data from Amazon S3 by exploiting little-known misconfigurations of Security Groups, EC2, IAM, and S3 i...

Cloud Cybersecurity and the Modern Applications (part 1)

Published: 05/26/2020

By Francesco Cipollone, Chair at Cloud Security Alliance UK Chapter and Director at NSC42 Ltd.Modern enterprises tend to utilize a mix or hybrid of cloud services like IaaS, PaaS and SaaS (Infrastructure/Platform/Software as a Service) to develop cloud applications. In a hybrid situation designi...

The road to the cloud- The story of public versus private

Published: 05/14/2020

By Dr. Wendy Ng - DevSecOps Security Advisor for ExperianWe are on the cusp of being a quarter of a way through the 21st century and you need to decide. Public or private cloud? But, what do these terms actually mean? Let me help walk you through and hopefully by the end of the article you will h...

Mobile-Connect Controls for Secure Remote Working

Published: 05/12/2020

By Neeraj Nayak, Sr. Product Marketing Manager, CipherCloudEndpoint security, today, has emerged as one of the biggest cybersecurity concerns in the industry. Due to the worldwide shift to remote workforce model, we are witnessing two major trends in the industry - (a) adoption of SaaS applicatio...

Why is Cloud DLP the most important technology for SaaS apps?

Published: 05/07/2020

By Neeraj Nayak, Sr. Manager, Product Marketing at CipherCloudData Loss Prevention (DLP) is not a new concept in the market. DLPs have been an integral part of data security software for over a decade. DLP is defined as a set of tools or technology that can detect and classify sensitive content w...

The State of Cloud Security 2020 Report: Understanding Misconfiguration Risk

Published: 05/05/2020

By Drew Wright, Fugue IncCloud misconfiguration remains the top cause of data breaches in the cloud, and the COVID-19 crisis is making the problem worse. These are among the findings of Fugue’s new State of Cloud Security 2020 survey. Nearly everyone is now working from home, and 84% are concerne...

What is a “Cloud Service Provider”

Published: 04/30/2020

By John DiMaria, Assurance Investigatory Fellow, Cloud Security AllianceDefining what is a Cloud Service Provider is not as easy as one might think, especially if you are an enterprise organization wondering if your vendors are servicing you from the cloud or not. A cloud service provider, or CSP...

Why Better Security is the First Step to Greater Trust

Published: 04/30/2020

By Tim Mullahy, Executive Vice President and Managing Director, Liberty One CenterWe are currently in the midst of a technological renaissance, and the world is going digital. On the one hand, that’s great. Innovations such as the Internet of Things (IoT) come hand-in-hand with incredible benefit...

Human and cyber-pandemic: the importance to get ready

Published: 04/28/2020

By Daniele Catteddu, Chief Technology Office, Cloud Security AllianceIronically, 2020 was supposed to be the year in which our luminous predictions of wealth and development would materialize. The advent of the Zeta-bytes word, trillions of smart devices in our all-encompassing smart environments...

Nine mandates to secure your remote workforce

Published: 04/22/2020

By Ishani Sircar, Manager, Product Marketing at CipherCloudAre We in a Cloud-First Environment?Let us look at a regular workday: A few updates on Slack, followed by emails on Microsoft Outlook, updating attendance on Workday, a few meetings with partners on Microsoft Teams, updating the status o...

Browse by Topic