Industry Insights

Read the latest cloud security news, trends, and thought leadership from subject matter experts.

Industry Insights
Cloud Workload Security: Part 3 - Explaining Azure’s Security Features
Published: 01/07/2021

Written by IntezerCloud security management will always remain an ongoing journey, as threats keep evolving and organizations need to keep updating their cloud security strategy. A well-defined set of security controls and categories helps you set a strong baseline in this journey, irrespective o...

Tokenization vs. Encryption: Which is Better for Your Business?
Published: 01/06/2021

Written by TokenExFinding the right security technology for your company's data can be difficult. There are myriad options and a lot of industry terms and jargon thrown around without much reliable information with which to make a smart business decision. To assist with this process, we're going ...

Cloud Workload Security: Part 2 - Security Features of AWS
Published: 12/28/2020

Written by IntezerThis article is the second post in our five-part series on security in the cloud today. In Part 1, we discussed what you need to focus on when developing your cloud security strategy, along with some controls you should consider and the best approach for implementing them. The r...

Cloud Workload Security: What You Need to Know - Part 1
Published: 12/21/2020

Written by IntezerCloud proliferation is on the rise, and more than ever before, security teams are on the lookout for solutions that align with evolving cloud security paradigms. Given the evolving threat landscapes and more sophisticated cyber attacks being reported daily, it’s clear that your ...

Using CSA STAR to Improve Cloud Governance and Compliance
Published: 12/19/2020

By John DiMaria, Assurance Investigatory Fellow, Cloud Security AllianceThe more complex systems become, the less secure they are, even though security technologies improve. There are many reasons for this, but it can all be traced back to the problem of complexity. Why? Because we give a lot of ...

How Does PCI DSS Protect Cardholder Data?
Published: 12/17/2020

By Branden Marrow from TokenEx The Payment Card Industry Data Security Standard (PCI DSS) is a payment industry security regulation developed, maintained, and enforced by the Payment Card Industry Security Standards Council (PCI SSC) to protect cardholder data (CHD). The council tasks organizati...

SolarWinds - How Cybersecurity Teams Should Respond
Published: 12/16/2020

By Paul Kurtz Co-founder and Executive Chairman, TruSTAR Technology SolarWinds perhaps represents the most severe hack of the digital age. The playbook of our adversaries continues to evolve, but defenders are losing, and the gap is widening. Discussion of imposing consequences on adversaries see...

Migrating to the Cloud: Compliance Issues When Transitioning from a Traditional Data Center
Published: 12/16/2020

Written by IntezerFor traditional data center operations, security and compliance requirements have always been operational overhead. Traditional data centers are under unique stresses in today’s world. There are pressures to make data centers more flexible and adaptable to business needs—such as...

CCSK Success Stories: From the Managing Director of a Consulting Firm
Published: 12/14/2020

This is part of a blog series interviewing cybersecurity professionals who have earned their Certificate of Cloud Security Knowledge (CCSK). In these blogs we invite individuals to share some of the challenges they face in managing security for cloud computing and how they were able to leverage k...

Are Containers More Secure Than VMs?
Published: 12/11/2020

Contributed by IntezerStop and think for a moment. How many virtual machines (VMs) do you have running in your production cloud environment? How many containers? Can you easily formulate the percentage split for your workload mix? 50/50? 80/20?Here’s a better question: How secure do you think you...

Security Policies | Q&A with TokenEx Industry Experts
Published: 12/10/2020

Contributed by TokenExSecurity Policies | What You Need to KnowWhat is a Security Policy?Security policies are internal frameworks that formally document an organization’s requirements for the safe handling of sensitive information and assets. Effective security policies tend to be developed for ...

Securely Implementing Salesforce as a IdP in a Multi-Org Architecture
Published: 12/09/2020

Written by Aaron Costello is an Offensive Security Engineer at AppOmniBy focusing on streamlining access to applications and services, most enterprises have deployed tooling that allows consolidated login for quicker access to the resources their employees need to accomplish their day-to-day job ...

4 Lessons For Small Ecommerce Stores Trying To Improve Security
Published: 12/04/2020

By Rodney Laws, Editor at Ecommerce PlatformsSecurity is tougher for small ecommerce stores. They don’t have weighty budgets allowing massive investment — and while they’re less likely to be targeted owing to their relative lack of popularity and revenue, their appeal lives in vulnerability. Afte...

CCSK Success Stories: From the Head Cybersecurity Architecture
Published: 12/03/2020

This is part of a blog series interviewing cybersecurity professionals who have earned their Certificate of Cloud Security Knowledge (CCSK). In these blogs we invite individuals to share some of the challenges they face in managing security for cloud computing and how they were able to leverage k...

Cloud Network Security 101 Part 3: Azure Service Endpoints vs. Private Endpoints
Published: 12/01/2020

By Becki Lee, Fugue, Inc.Originally published on Fugue’s Website on October 8, 2020Level: AdvancedReading Time: 4 minutesAzure offers two similar but distinct services to allow virtual network (VNet) resources to privately connect to other Azure services. Azure VNet Service Endpoints and Azure P...

Letting The Right One In: A Preamble to Device Trust
Published: 11/26/2020

Written by Dave Lewis, Advisory CISO — Global at Duo I’m sorry, do I know you? A typical query that people may ask when confronted by an unknown person who walks up abruptly and starts asking them questions. Oddly though, this sort of response does not happen in many network environments. When ...

CSA Survey Finds Organizations are Shifting their Use of IAM Capabilities in 2021
Published: 11/25/2020

The use of cloud services have continued to increase over the past decade. Particularly in the wake of the COVID-19 public health crisis, many enterprises' digital transformations are on an accelerated track to enable employees to work from home. CSA surveyed these organizations to better underst...

Roadmap to Earning Your Certificate in Cloud Security Knowledge (CCSK)
Published: 11/24/2020

In this blog we’ll be taking a look at how to earn your Certificate of Cloud Security Knowledge (CCSK), from study materials, to how to prepare, to the details of the exam, including a module breakdown, passing rates, format etc. Below is an infographic highlighting the main topics we'll be discu...

Cloud Network Security 101: Azure Private Link & Private Endpoints
Published: 11/24/2020

By Becki Lee, Fugue, Inc. | Originally published on Fugue’s Website on September 25th, 2020.Azure offers two similar but distinct services to allow virtual network (VNet) resources to privately connect to other Azure services. Azure VNet Service Endpoints and Azure Private Endpoints (powered by ...

3 Reasons Why You Need to Include a VRM Platform in 2021
Published: 11/23/2020

This blog was originally published by Whistic here. 2020 has been an incredibly long year for all of us. Honestly, we’re ready to start afresh in 2021. As the past months have brought on some unique challenges for InfoSec teams, they have also revealed areas of opportunity and growth regarding ho...

Browse by Topic