Industry Insights

Read the latest cloud security news, trends, and thought leadership from subject matter experts.

Industry Insights
Digital Transformation, Cybersecurity, Cloud Apps, and Cloud Security

Published: 11/21/2019

By Ben Rice VP Business Development at BitglassWhat you see in the title is what we covered in our latest webinar, but what part of it is really important? All of it? Some? Or is it all just marketing blather that can be ignored? The truth lies in the middle – we are all adopting more cloud in ou...

The Four Pillars of CASB: Threat Protection

Published: 11/18/2019

By Juan Lugo Product Marketing Manager at BitglassThreat protection is integral for defense against malware. Oftentimes, months go by without organizations realizing that they have been infected with malware – rather than addressing the problem after the fact, it is best to prevent the attack in ...

​Keeping Up With Changing Technology by Reducing Complexity

Published: 11/15/2019

By John DiMaria; CSSBB, HISP, MHISP, AMBCI, CERP, CSA Research Fellow, Assurance Investigatory Fellow, Cloud Security Alliance Fox News reported that in answer to the previous Boeing 737 accidents, the Federal safety officials say, “Boeing should consider how cockpit confusion can slow the res...

4 Common Cloud Misconfigurations & What To Do About Them

Published: 11/14/2019

By Kevin Tatum, IT Security Engineer at ExtraHopIn a recent report, McAfee uncovered the rise of Cloud-Native Breaches and the state of multi-cloud adoption. We'll define the top 4 cloud misconfiguration goofs from their list, how they can affect your organization, and what to do about them.When ...

The Risk of Unsecured Dev Accounts

Published: 11/13/2019

This article was originally published on Fugue's blog here. By Drew Wright, Co-Founder Fugue Most organizations now recognize the importance of cloud security, likely due in large part to the sharp uptick in cloud-based data breaches resulting from cloud misconfiguration. Achieving an...

Google’s Potential Claim to the Throne of Quantum Supremacy: What Does it Mean for Cybersecurity?

Published: 11/06/2019

By Roberta Faux, Shamik Kacker, Bruno Huttner, John Hooks, Ron F. del Rosario, Ludovic Perret and John Young A mysterious paper A research paper titled “Quantum Supremacy Using a Programmable Superconducting Processor” briefly appeared last September 21, 2019 on NASA’s Technical Report Server (...

CMMC – the New Protocol Droid for DoD Compliance

Published: 11/06/2019

By Doug Barbin - Cybersecurity Practice Leader at Schellman & Company, LLCA long time ago in a galaxy exactly ours…There was 800-171. For some time, the US Department of Defense has been working to revise its funding procurement procedures referred to as the Defense Acquisition Regulation...

3 Technical Benefits of Service Mesh, and Security Best Practices

Published: 11/04/2019

By Ran Ilany, co-founder and CEO for PortshiftOrganizations that implement containers often ask about using a service mesh layer. While this isn’t obligatory by any means, there are many benefits to running a service mesh that makes it the sensible choice for organizations seeking security, effic...

Corporate Contractors and the Requirement for Zero-Trust Network Access

Published: 10/21/2019

By Etay Bogner, VP, Zero-Trust Products Proofpoint and former CEO of Meta NetworksIt’s not a stretch to say that most industries and organizations today have contractors in the mix who need remote access to the company’s network. Yet the traditional virtual private network (VPN) method of enablin...

Introducing Reflexive Security for integrating security, development and operations

Published: 10/14/2019

By the CSA DevSecOps Working Group Organizations today are confronted with spiraling compliance governance costs, a shortage of information security professionals, and a disconnect between strategic security and operational security. Due to these challenges, more and more companies value agility ...

Cloud Penetration Testing the Capital One Breach

Published: 10/10/2019

By Alexander Getsin, Lead Author for Cloud Penetration Testing PlaybookAligning the Capital One breach with the CSA Cloud Penetration Testing PlaybookIn March 2019, Capital One suffered a unique cloud breach. 140,000 Social Security numbers and 80,000 linked bank account numbers were exposed, alo...

It's all about the Data! - Preventative Security

Published: 10/08/2019

By John DiMaria, Assurance Investigatory Fellow, Cloud Security AllianceI have always said I am a "data guy." Decisions made with data eliminate all bias, opinions, and ad hoc decisions that cause potential costly moves.In my most recent podcast interview with Phillip Merrick, CEO of Fugue, he di...

Guardians of the Cloud: The Latest Security Findings

Published: 10/07/2019

By Juan Lugo from BitglassWith the emergence of cloud adoption and BYOD in the workplace, companies are experiencing an overwhelming amount of data breaches. This is largely because they are not taking the appropriate steps to secure data in the cloud. As such, Bitglass conducted a survey with IT...

Why you can't have backdoored crypto that is secure

Published: 10/03/2019

By Kurt Seifried, Chief Blockchain Officer, CSASo as you have probably seen some parts of the US government are again making noise about end-to-end encryption. We’ve seen this before (clipper chip, key escrow, etc., etc.). The new twist is that they appear to be trying a thin end of the wedge app...

What to Expect at the 2019 Colorado Chapter Forum

Published: 10/02/2019

Understanding the complexities of cloud security can be very challenging. Because of this, Cloud Security Alliance has membership opportunities, resources, certifications, and local chapters to help explain it. The Colorado Chapter of Cloud Security Alliance is pleased to announce its 4th annual ...

Cloud Security Posture Management: Why You Need It Now

Published: 10/01/2019

By Samantha Nguyen, Product Manager, BitglassGartner recommends that security and risk management leaders invest in CSPM (cloud security posture management) processes and tools to avoid misconfigurations that can lead to data leakage. Although it is a relatively new class of tools, this recommend...

How Blockchain Might Save Us All

Published: 09/27/2019

By Kurt Seifried, Chief Blockchain Officer, CSAI’ve been seeing a lot of articles claiming that Blockchain will save us from hackers, and ransomware, and all sorts of other Cyber-Shenanigans. So… will Blockchain save us all? Yes, well . . . sort of, it’s complicated. Let’s start with a story:The ...

Announcing the [email protected] San Francisco 2019 Agenda

Published: 09/25/2019

By the HackerOne Team The agenda for the third annual hacker-powered security conference, [email protected] San Francisco, is live! [email protected] is the only conference dedicated to the booming hacker-powered security industry, where hackers and leaders come together to build a safer internet. The confer...

The Three Essential Requirements for Securing IaaS

Published: 09/23/2019

By Will Houcheime, BitglassIn today's cloud-first world, organizations have been utilizing infrastructure as a service (IaaS) to better benefit their operations. Using tools like AWS, GCP, or Azure allows organizations to focus on business growth, as well as gain flexibility, scalability, and cos...

Sidechains, beacon chains and why we shouldn’t give up on Blockchain performance quite yet

Published: 09/18/2019

By Kurt Seifried, Chief Blockchain Officer, CSAIf you’ve been in IT you’ve probably learned one of the simple lessons:Scaling out is hard and can be expensive, but scaling up is easy and even more expensive. In simple terms if you can scale out you can keep costs down, ideally at a linear growth ...

Browse by Topic