Industry Insights

Read the latest cloud security news, trends, and thought leadership from subject matter experts.

Industry Insights
What an Auditor Should Know about Cloud Computing Part 3
Published: 04/27/2021
Author: Moshe Ferber

With the launch of the Certificate of Cloud Auditing Knowledge (CCAK) credential by ISACA and CSA, Moshe Ferber has put together some of the insights gained during the creation of the CCAK. This is the third in a series of three blogs dealing with the essentials an auditor needs to know about clo...

How to Secure Cloud Non-Native Workloads
Published: 04/26/2021

This blog was originally published by Intezer here.Not All Applications are Cloud-NativeCompanies are adopting cloud at a faster pace but not all applications are born cloud-native. Many traditional applications are simply “lifted and shifted” to the cloud as a first step in the cloud transformat...

CCAK Testimonials: From a Cybersecurity Architect
Published: 04/22/2021

The Certificate of Cloud Auditing Knowledge (CCAK) is the first credential available for industry professionals to demonstrate their expertise in the essential principles of auditing cloud computing systems. The CCAK credential and training program fills the gap in the market for technical educat...

Introduction to the NIST Cybersecurity Framework
Published: 04/21/2021

This blog was originally published by OpsCompass hereWritten by Kevin Hakanson, OpsCompassSecurity Framework Based on Standards, Guidelines, and PracticesThe NIST Cybersecurity Framework (NIST CSF) was created via a collaboration between the United States government and industry as a voluntary fr...

What an Auditor Should Know about Cloud Computing Part 2
Published: 04/20/2021

Deep Dive into Cloud GovernanceWith the launch of the Certificate of Cloud Auditing Knowledge (CCAK) credential by ISACA and CSA, Moshe Ferber has put together some of the insights gained during the creation of the CCAK. This is the second in a series of three blogs dealing with the essentials an...

Cloud-Native Security 101
Published: 04/19/2021

This blog was originally published by Intezer.The arrival of the cloud has changed the application development process. Agile cloud-native applications have replaced traditional monolithic application architectures, and components are no longer bundled into a single server. This transformation ha...

Why Remote Browser Isolation (RBI), Why Now?
Published: 04/14/2021

This post was originally published on Ericom's blog here.Written by Dr. Chase Cunningham, EricomRemote Browser Isolation, aka RBI, was more of a “fringe” technology when it first came on the scene. I wrote about RBI a few years ago while working as an analyst. At that time, it was noted as someth...

​Developing Key Management Systems
Published: 04/09/2021

Based on a publication written by the Cloud Key Management Working GroupKey management is the management of cryptographic keys in a cryptosystem. A reliable key management system (KMS) helps a business meet compliance and data control requirements, and also benefits the overall security of the or...

​How CCAK Elevates and Impacts Other Credentials
Published: 04/07/2021

Written by Daniele Catteddu, Chief Technology Officer, CSAThe skills gap is not a new topic when it comes to cloud or cybersecurity. Per Flexera's 2020 State of the Cloud report, 59% of enterprises expect cloud usage to exceed prior planned usage due to COVID-19 – which creates a high demand for ...

​Cloud-Native Security Starts with the Cloud
Published: 04/07/2021

Oracle author: Maywun Wong, Director, Product MarketingContributed by: Frank Dickson, IDC, Program Vice President, Security & Trust“Cloud-native security!” is the battle cry of the day. We all want it. But what is it? Everyone seems to define it differently. My suggestion is that any discussi...

What an Auditor Should Know about Cloud Computing Part 1
Published: 04/06/2021

An Introduction to Cloud Terminology and General GovernanceWritten by Moshe Ferber, CCSK and CCAK InstructorThis is the first in a series of three blogs dealing with the essentials an auditor needs to know about cloud computing. In recent years, there has been a strong focus on building cloud pla...

CCSK Success Stories: From a Senior Executive
Published: 04/01/2021

This is part of a blog series interviewing cybersecurity professionals who have earned their Certificate of Cloud Security Knowledge (CCSK). In these blogs we invite individuals to share some of the challenges they face in managing security for cloud computing and how they were able to leverage k...

Beware of Legitimate, but Compromised Websites
Published: 03/30/2021

This blog was originally published by Ericom By Mendy Newman, Group CTO, International, Ericom SoftwareIt’s easy to get lulled into a false sense of security when visiting a website you know – “I navigated directly to xyz.com so I know this isn’t a spoofed site. Surfing here, even downloading thi...

How SDP Can Be Used to Thwart DDoS Attacks
Published: 03/26/2021

By Shamun Mahmud, Senior Research Analyst and Standards Officer for the Cloud Security AllianceSoftware Defined Perimeter provides an integrated security architecture that is otherwise hard to achieve with existing security point products. We’ve seen tremendous growth in interest, enterprise adop...

5 Best Practices for Securing Microsoft Azure
Published: 03/25/2021

This blog was originally published by OpsCompass.By John Grange from OpsCompass.Cloud adoption has led to a major shift in application security management. Unlike on-premises where the focus is more on perimeter security, cloud deployments demand a more holistic and integrated approach. Ensuring ...

Incident Response and Knowing When to Automate
Published: 03/24/2021

This blog was originally published on Vectra.ai Measuring and improving total time of response is easier said than done. The reality is many organizations do not know their existing state of readiness to be able to respond to a cybersecurity incident in a fast, effective manner. And most don’t...

Planning Through Recovery: Five Things to Keep in Mind
Published: 03/23/2021

By Bryan Sartin, Senior Vice President, Chief Services Officer, eSentirePlanning is everything. Just ask the Boy Scouts. While being caught in a downpour without an umbrella is certainly inconvenient, maybe even unpleasant, it pales in comparison to your organization experiencing a significant da...

CCAK Testimonials: From a Cybersecurity Consultant
Published: 03/22/2021

The Certificate of Cloud Auditing Knowledge (CCAK) is the first credential available for industry professionals to demonstrate their expertise in the essential principles of auditing cloud computing systems. The CCAK credential and training program will fill the gap in the market for technical ed...

​Cloud Explosion Catapults Privileged Access Management and Identity Security to the Forefront
Published: 03/22/2021

By Justyna Kucharczak from CyberArk 2020 introduced a host of unexpected challenges for cybersecurity teams. Not only must they protect increasingly complex IT environments, they’re now charged with deploying new models to enable mobile and geographically dispersed workforces. As they move for...

CCSK Success Stories: From an IT Security Consultant
Published: 03/19/2021

This is part of a blog series interviewing cybersecurity professionals who have earned their Certificate of Cloud Security Knowledge (CCSK). In these blogs we invite individuals to share some of the challenges they face in managing security for cloud computing and how they were able to leverage k...

Browse by Topic
Write for the CSA blog
Submit your blog proposal