Industry Insights

Read the latest cloud security news, trends, and thought leadership from subject matter experts.

Industry Insights
How to Secure Deployments in Kubernetes?
Published: 05/09/2022

This blog was originally published by ARMO here. Written by Leonid Sandler, CTO & Co-founder, ARMO. Security is crucial ‌for containerized applications that run on a shared infrastructure. With more and more organizations moving their container workloads to Kubernetes, K8s has become the go-to pl...

Ultimate Guide to Observability: What It Is and How to Do It Well
Published: 05/06/2022

This blog was originally published by Contino here. Written by Matthew Macdonald-Wallace, Contino. The complexity of software systems is ever increasing; organisations need to invest in ensuring that their systems are operable.In this blog, we’re taking a deep dive into observability: what it is,...

The Five Universal Fundamentals for Securing Your Cloud
Published: 05/06/2022

This blog was originally published on on April 7, 2022.Written by Josh Stella, chief architect at Snyk. The word “misconfiguration” can seem quite innocuous — an innocent mistake that’s easy to fix, like putting your car into drive while the parking brake is still engaged. You quickl...

CCSK Success Stories: From the Vice President of Strategic Alliances
Published: 05/05/2022

This is part of a blog series interviewing cybersecurity professionals who have earned their Certificate of Cloud Security Knowledge (CCSK). In these blogs we invite individuals to share some of the challenges they face in managing security for cloud computing and how they were able to leverage k...

What’s Zero Trust Data Access?
Published: 05/04/2022

This blogs was originally published by DoControl here. Written by Adam Gavish, DoControl. “Zero trust is a way of thinking, not a specific technology or architecture,” says Gartner Distinguished VP Analyst Neil MacDonald. “It’s really about zero implicit trust, as that’s what we want to get rid o...

What is a BLOB (Binary Large Object)? Can it be Tokenized?
Published: 05/04/2022

This blog was originally published by TokenEx here. Written by Anni Burchfiel, TokenEx. BLOB Definition BLOB stands for a “Binary Large Object,” a data type that stores binary data. Binary Large Objects (BLOBs) can be complex files like images or videos, unlike other data strings that only store...

Accelerating Transaction Success by Applying Zero Trust Principles to Mergers, Acquisitions, and Divestitures
Published: 05/03/2022

This blog was originally published by CXO REvolutionaries here. Written by Stephen Singh, Global Vice President, M&A/Divestiture and ITO Strategy, Planning, and Implementation, Zscaler. Mergers, acquisitions, and divestitures create value by seizing chances to drive growth, enhance margins, build...

Who Owns Third-Party Risks: Breaking Down Management and Compliance Silos
Published: 05/03/2022

This blog was originally published by OneTrust here. Third-party risk management (TPRM) can have a different meaning for different business units, but one thing is for certain: visibility and proper oversight is an absolute must. There are a variety of stakeholders in the business who require...

Security Service Edge (SSE) is the Way to Go, But How Do You Choose?
Published: 05/02/2022

This blog was originally published by Lookout here. Written by Pravin Kothari, Executive Vice President, Product and Strategy, SASE, Lookout. Gartner® recently predicted that “By 2025, 80% of enterprises will have adopted a strategy to unify web, cloud services and private application access from...

The State of Data Security in 2022
Published: 05/02/2022

This blog was originally published by BigID here. Written by Neil Patel, BigID. Data is an organization’s single most valuable asset, relied upon to make critical strategic and operational decisions every day. Much of this information is highly sensitive or critical — and in some cases vulnerable...

The Cloud Has No Hard Edges
Published: 04/29/2022

Written by Tim Sedlack, Sr. Director, Product Management, BeyondTrust You’ve seen the popular meme “I’m old enough to remember when …”, I’m certain. Well, as trite as it sounds, I am old enough to remember when cybersecurity had some pretty hard and fast rules. Passwords had to be complex, and n...

Kubernetes Version 1.24: Everything You Should Know
Published: 04/29/2022

This blog was originally published by ARMO here. Written by Amir Kaushansky, ARMO. The first Kubernetes release of 2022 will be released on May 3rd. The new release, version 1.24, is full of enhancements, new features, and bug fixes.We’ve written this post so you can adjust your Kubernetes resour...

How SOC 2 Is Changing the Face of Compliance in the Caribbean: Part Two
Published: 04/28/2022

Written by Cloud Carib As Caribbean cloud providers grow and expand into new markets, it has become vital that such organizations meet rigorous, standardized requirements. In part one of our series, we established why standardized compliance standards like SOC 2 (Service Organization Control 2) a...

MFA Is Only As Effective As We Want It To Be
Published: 04/28/2022

Written by Authomize Good cybersecurity is all about getting the basics right. Sure, AI and other advanced technologies help us to cyber better, faster, stronger, etc. But the really important work is all about actually using the most basic of tools to fend off the vast majority of attacks. One o...

Doing Business in Brazil? Get to Know the General Personal Data Protection Law (LGPD)
Published: 04/27/2022

Written by VGS. Did you know that Brazil is bigger than the 48 contiguous United States? The US is only bigger than Brazil if you add Alaska! São Paulo, with over 21 million residents, is more populous than New York. And Brazil’s 210 million citizens enjoy a thriving economy: Brazil’s Gross Domes...

5 Benefits of Detection-as-Code
Published: 04/27/2022

This blog was originally published by Panther here. Written by Kartikey Pandey, Panther. How modern teams can automate security analysis at scale in the era of everything-as-code.TL;DR: Adopt a modern, test-driven methodology for securing your organization with Detection-as-Code.Over the past dec...

As You Move to the Cloud, Make Sure Your PKI Goes with You
Published: 04/26/2022

This blog was originally published by Entrust here. Written by Samantha Mabey, Product Marketing Management Director, Certificate Solutions at Entrust. I’m sure most of us have heard the buzz around “multi-cloud” or “hybrid cloud.” But what exactly does it mean? And more importantly, what does it...

How SOC 2 Is Changing the Face of Compliance in the Caribbean: Part One
Published: 04/26/2022

Written by Cloud Carib For small island developing nations across the Caribbean and Latin American region, 2020 will, among other things, be remembered as a major catalyst for the acceleration of digital transformation. The onset of the global pandemic exposed major cracks in the infrastructure m...

The Challenge of Protecting Business-Critical Data and Applications
Published: 04/25/2022

This blog was originally published by Onapsis here. Global market intelligence firm IDC conducted a market survey in Germany in September 2021 to explore the challenges enterprises are currently facing in the development and running of security landscapes, as well as the plans they are pursuing t...

Higher Ed Gets an 'F' for Ransomware Protection: How the Industry Must Evolve
Published: 04/25/2022

This blog was originally published by CXO REvolutionaries here. Written by Bryan Green, Chief Information Security Officer, Zscaler. Colleges and universities are amongst the slowest populations to modernize security controls, resulting in a high price tag – ransomware and breaches.It’s human nat...

Browse by Topic
Write for the CSA blog
Submit your blog proposal

Sign up to receive CSA's latest blogs

This list receives 1-2 emails a month.