Circle
Events
Blog

Industry Insights

Read the latest cloud security news, trends, and thought leadership from subject matter experts.

Industry Insights
DevSecOps Best Practices for Vulnerability Management in the Cloud
Published: 04/22/2022

This blog was originally published by Vulcan Cyber here. Written by Natalie Kriheli, Vulcan Cyber. With DevSecOps best practices, teams can remain on top of their security controls while taking full advantage of everything the cloud has to offer. A growing trend in the cloud ecosystem, DevSecOps ...

Four Ways to Use the Cloud Security Maturity Model
Published: 04/22/2022

This blog was originally published by Secberus here. Written by Fausto Lendeborg, Secberus.With a name like, Cloud Security Maturity Model, you may be one of the CISOs who think: Sounds like a lot of work.Where does my organization sit?How do we advance?Why should I care?And if any of those quest...

Threat Modelling: What It Is and Why It Matters
Published: 04/21/2022

This blog was originally published by Contino here. Written by Marcus Maxwell, Contino. Identifying the security threats that your systems face is one step towards mitigating potential vulnerabilities as part of a wider risk management strategy. But on its own, awareness of threats is not enough ...

A Look Inside a Benchmark Model In InfoSec: CIA Triad
Published: 04/21/2022

This blog was originally published by SafeBase here. We are constantly hearing tips and tricks on how to protect our data - get a VPN, back everything up on a cloud, change your passwords, etc.. And in the business world, there are tons of policies in place and certifications that can be acquired...

Security Performance Reporting
Published: 04/20/2022

Command guidance for CISO-to-stakeholder communications Written by John Hellickson, Field CISO, Coalfire There is tremendous urgency for security professionals to do a better job at communicating security program performance to enterprise stakeholders and boards of directors. For the Coalfire ...

Weathering Russian Winter: The Current State of Russian APTs
Published: 04/20/2022

This blog was originally published by LogicHub on April 8, 2022. Written by Tessa Mishoe, Senior Threat Analyst, LogicHub. Russian Advanced Persistent Threats (APTs)It’s no secret that Russian Advanced Persistent Threats (APTs) are a significant burden on cybersecurity teams. For years, organizat...

Crypto Caper: How Cybercriminals Steal Crypto from Blockchain Networks
Published: 04/19/2022

This blog was originally published by TokenEx here. Written by Valerie Hare, TokenEx. In 2009, the first established cryptocurrency was born – Bitcoin. If you aren't familiar with cryptocurrency, it's an online currency with ledgers secured by encryption. Since those early years, digital currency...

What the Businesses at Work Report Means for Your SaaS Security Program
Published: 04/18/2022

This blog was originally published on February 22, 2022 by DoControl. Written by Corey O'Connor, DoControl. Earlier this month, Identity and access management platform leader Okta published their 8th annual “Businesses at Work” report. The report pulls data from their more than 14,000 global cust...

Network Intelligence: Required Information and Insights in This Digital Era
Published: 04/18/2022

This blog was originally published by Gigamon here. Written by Mark Leary, IDC Research Director, Network Analytics and Automation. For more, read Part 1 of this series.In my previous guest blog, “Your Network and Their Cloud: Less Visibility. More Vulnerabilities,” I focused on the rising challe...

6 SDP Deployment Models to Achieve Zero Trust
Published: 04/16/2022

Written by the SDP and Zero Trust Working GroupWith Software Defined Perimeter (SDP), enterprises can move away from traditional (and largely ineffective) perimeter-centric models, achieving the goals of Zero Trust and therefore improving their security effectiveness and resiliency. SDPs replace ...

Cyber Protection Week 2022: The Need (And Demand) For Integration Grows
Published: 04/15/2022

This blog was originally published on March 31, 2022 by Acronis. Written by Dave Kostos, Acronis. For a long time, March 31 was World Backup Day: an annual event created to raise awareness of the importance of backup best practices. In 2020, we celebrated the final World Backup Day and, with a vi...

The Dangers of Exposed Elasticsearch Instances
Published: 04/15/2022

This blog was originally published by Open Raven here. Written by Michael Ness, Open Raven. Elasticsearch is a widely used text-search and analytics engine. The tooling provides a simple solution to quickly, easily, and efficiently store and search large volumes of data. Elasticsearch is utilized...

Why You Need Application Security Testing for Business-Critical Applications
Published: 04/14/2022

This blog was originally published by Onapsis here. This blog is about the importance of building secure business-critical applications with application security testing. While many organizations employ defense-in-depth security models to protect their critical systems, not enough consideration i...

Now, More Than Ever, Mentorship Matters in Cybersecurity
Published: 04/14/2022

This blog was originally published by CXO REvolutionaries here. Written by Kavitha Mariappan, EVP, Customer Experience and Transformation, Zscaler. Twin trends unfolding within cybersecurity are making mentorship relationships more critical than ever. On the one hand, an increasingly digitized wo...

SANS Cloud Security Survey 2022 – Highlights
Published: 04/14/2022

This blog was originally published by Vulcan Cyber here. Written by Orani Amroussi, Vulcan Cyber. In 2022, security issues have increased in cloud assets, leading to more data breaches involving cloud environments. But, despite the growing threats and attached cyber risk, organizations are undete...

Pentests Often Miss 6 Critical SaaS Security Issues. Here’s Why.
Published: 04/13/2022

This blog was originally published by AppOmni here. Written by Tim Bach, Vice President of Engineering, AppOmni. As security and compliance teams assess the fallout and lessons learned from data breaches, they’ll need to re-evaluate their security practices and controls. This is particularly ...

Governing the Organization
Published: 04/13/2022

This blog was originally published by Coalfire here. Written by Matt Klein, Field CISO, Coalfire. Security is the biggest risk to business today. Managing security has become one of the hardest jobs in the enterprise, and failing to do so effectively can create opportunities for severe operationa...

The Evolution from SIEM to AI Driven Automation
Published: 04/12/2022

This blog was originally published by LogicHub here. Written by Kumar Saurabh, LogicHub. Kumar Saurabh, LogicHub CEO and Co-founder, discusses his experience in the SIEM space and what he sees as the natural evolution from SIEM technology to AI and automation driven detection and response.The Ear...

Cyber Readiness and the Russia-Ukraine War
Published: 04/12/2022

This blog was originally published on March 10, 2022 by Lookout. Written by Hank Schless, Senior Manager, Security Solutions, Lookout. I was encouraged when I saw our partners over at Microsoft step in when Russian cyberattacks commenced alongside their invasion of the Ukraine. While there ...

20 DevSecOps Best Practices Across People, Process and Technology
Published: 04/12/2022

This blog was originally published by Contino here. Written by Marcus Maxwell, Contino. How can secure software be developed at speed and scale!?This is the ultimate IT paradox for modern global enterprise organisations: go faster and innovate. But always stay secure.DevSecOps is the answer to in...

Browse by Topic
Write for the CSA blog
Submit your blog proposal

Sign up to receive CSA's latest blogs

This list receives 1-2 emails a month.