Cloud 101
Circle
Events
Blog

Industry Insights

Read the latest cloud security news, trends, and thought leadership from subject matter experts.

Industry Insights
Supply Chain Attack via a Trojanized Comm100 Chat Installer
Published: 11/02/2022

Originally published by CrowdStrike. Leveraging a combination of advanced machine learning and artificial intelligence, a new supply chain attack was identified during the installation of a chat-based customer engagement platform. The supply chain attack involved a trojanized installer for the Co...

The Quiet Victories and False Promises of Machine Learning in Security
Published: 10/24/2022

Originally published by Dark Reading and Sysdig. Written by Anna Belak, Sysdig. Contrary to what you might have read on the Internet, machine learning (ML) is not magic pixie dust. It’s a broad collection of statistical techniques that allows us to train a computer to estimate an answer to a ques...

How to Solve Complex Cloud Security Problems with AI
Published: 09/16/2022

Written by Morey J. Haber, Chief Security Officer, BeyondTrust. Artificial intelligence (AI) and, to a lesser extent, machine learning (ML) have become increasingly prevalent as a solution to solve complex cybersecurity problems. While the cloud has made this more practical due to shared resource...

Cryptominer Detection: A Machine Learning Approach
Published: 09/15/2022

Originally published by Sysdig here. Written by Flavio Mutti, Sysdig. Cryptominers are one of the main cloud threats today. Miner attacks are low risk, low effort, and high reward for a financially motivated attacker. Moreover, this kind of malware can pass unnoticed because, with proper evasive ...

Using AI/ML to Create Better Security Detections
Published: 08/19/2022

Originally published by LogicHub here. Written by Anthony Morris, Solution Architect, LogicHub. The blue-team challenge Ask any person who has interacted with a security operations center (SOC) and they will tell you that noisy detections (false positives) are one of the biggest challenges. There...

Context Counts: How to Use Transfer Learning and Model-Aided Labeling to Train Data Tailored Models
Published: 08/17/2022

Originally published by BigID here. Written by Itamar Zaltsman, BigID. Thanks to great advances and breakthroughs in the area of Natural Language Processing (NLP), we have access to a vast amount of ready to use Named Entity Recognition (NER) classifiers. These classifiers are available in many c...

Should You Outsource or Manage Security In-House?
Published: 07/29/2022

This blog was originally published by LogicHub here.Written by Willy Leichter, Chief Marketing Officer, LogicHub.Cybersecurity professionals Colin Henderson and Ray Espinoza share their take on in-house versus outsourced threat detection and response.Your in-house team has the context necessary t...

Four Reasons for Alert Fatigue and How to Make It Stop
Published: 06/24/2022

This blog was originally published by LogicHub here. Written by Ryan Thomas, VP of Product Management, LogicHub. Alert (or alarm) fatigue is the phenomenon of becoming desensitized (and thus ignoring or failing to respond appropriately) to signals meant to warn us about emergencies.IT security...

The 3 Biggest Challenges Faced by Today's SOCs & One Smart Solution
Published: 06/14/2022

This blog was originally published by LogicHub here. Written by Kumar Saurabh, CEO and Co-founder, LogicHub. As a security operations professional, you've put in your fair share of late nights. You know what it's like to wake up to a deluge of alerts and the need to assess the situation — fast. Y...

Predictive Analytics and Machine Learning in Cybersecurity: an Untapped Opportunity for ‘Negative’ Response Time
Published: 06/13/2022

This blog was originally published by CXO REvolutionaries here. Written by Brad Moldenhauer, CISO - Americas, Zscaler. The chief information security officer (CISO) is measured by his or her ability to reduce risk, control cost, and minimize friction among employees, data, and the business at lar...

It's Time to Put AI to Work in Security
Published: 05/31/2022

This blog was originally published by LogicHub here. Written by Willy Leichter, LogicHub. While we’ve been talking about and imagining artificial intelligence for years, it only has recently started to become mainstream, and accepted for a wide range of applications – from healthcare analytics to...

The Evolution from SIEM to AI Driven Automation
Published: 04/12/2022

This blog was originally published by LogicHub here. Written by Kumar Saurabh, LogicHub. Kumar Saurabh, LogicHub CEO and Co-founder, discusses his experience in the SIEM space and what he sees as the natural evolution from SIEM technology to AI and automation driven detection and response.The Ear...

Handling the Challenge of Model Drift in Data Lakes
Published: 03/30/2022

Written by Dr. Nathan Green, Marymount University and Oliver Forbes, NTT DATA One of the most constant and evolving characteristics of the sharing of information, is data in its readable form and its various models of consumption. Machine learning is an impactful tool of analysis that plays a...

Adopting AI-based Attack Detection
Published: 03/24/2022

This blog was originally published by LogicHub here. Written by Willy Leichter, Chief Marketing Officer, LogicHub. The security industry is long-overdue for real innovation with the practical application of emerging technologies around automation, machine learning, and artificial intelligence for...

The Top 22 Digital Transformation Trends To Look Out For In 2022
Published: 03/22/2022

This blog was originally published by Contino here. Written by Deepak Ramchandani, Contino. 2021 was a big year in the world of digital transformation. The pandemic continued to push businesses to accelerate their digital journeys. From data-driven sustainability initiatives to cloud-first remote...

On the Cyber Horizon
Published: 01/20/2022

This blog was originally published by KPMG on December 16, 2021. Written by David Ferbrache, KPMG. As 2021 draws to a close, we see a world still challenged by COVID-19, necessitating new business models, new channels and a shift (perhaps for the long term) to remote and hybrid working. But one t...

Securing Data Lakes in a Data Centric World
Published: 01/14/2022

Written by Dr. Diane Murphy, Marymount University and Oliver Forbes, NTT DATA Data allows the business of today to optimize performance, investigate fraud and discover solutions to problems that we didn't even know the question to. At the heart of such are the inner workings of expansive data lak...

You Can’t Detect What You Can’t See – In Real-Time. The Modern Cloud Security Edition
Published: 08/06/2021

This blog was originally published by Blue Hexagon here.Written by Arun Raman, Blue Hexagon.There is an old maxim in cybersecurity: “You cannot detect what you cannot see.” While we hold the need for security visibility as a self-evident truth, there are implications for a cloud security architec...

3 Key DevSecOps Trends for 2021
Published: 07/29/2021

This blog was originally published by Blue Hexagon here.Written by Saumitra Das, Blue Hexagon.DevSecOps is a term that means different things to different people. I see it as primarily as an umbrella term for “continuous security” or security that is built into the process of building, shipping, ...

Machine Learning in Identity and Access Management
Published: 07/14/2021

This blog was originally published by ZTEdge hereWritten by Leo Versola, ZTEdge In recent years, artificial intelligence and machine learning have been quietly transforming industries from agriculture and education to healthcare, marketing, and customer service. In 2018 over 60,000 US patent app...

Browse by Topic
Write for the CSA blog
Submit your blog proposal

Sign up to receive CSA's latest blogs

This list receives 1-2 emails a month.