Industry Insights
Read the latest cloud security news, trends, and thought leadership from subject matter experts.

When is SD-WAN Zero Trust and When is it Not?
Originally published by CXO REvolutionaries. Written by Gary Parker, Field CTO - AMS, Zscaler. Deploying a standalone SD-WAN might seem reasonable given the way workers connect today. Many of today's knowledge workers are returning to branch offices, while others still work remotely more often th...
What is a CASB and How Does it Integrate with DLP?
Originally published by DoControl. Written by Corey O'Connor, DoControl. Cloud Access Security Broker (CASB) solutions and Data Loss Prevention (DLP) are both aging technologies and markets, but conceptually are both very relevant for security and risk leaders. The need for controls to prevent th...
Security Service Edge (SSE) Reflects a Changing Market: What You Need to Know
This blog was originally published by CXO REvolutionaries here. Written by Sanjit Ganguli, VP Transformation Strategy/Field CTO - Global Enterprise, Zscaler. What the world needs is another acronym in cyber security, said absolutely NO ONE. However, as a former Gartner analyst who helped bring my...
Multi Cloud Security
Written by Madhukeshwar Bhat, Director, Chapter Development, CSA Bangalore, and Rob Aragao, Chief Security Strategist, CyberRes “Computing may someday be organized as a public utility just as the telephone system is a public utility”- Prof. John McCarthy at MIT’s centennial celebration in 1961.T...
The Evolution of Cloud Security in 2022
This blog was originally published by G2 here. Written by Aaron Walker, G2. This post is part of G2's 2022 digital trends series.Unified security for the distributed cloudIn the early days of cloud computing, businesses had a simple choice: adopt or don’t. Back then, security was a secondary conc...
Focus on People, Process, and Technology to Secure Your Shadow IT
Written by David Golding, AppOmni. Anyone in IT is familiar with shadow IT. How many times has an IT manager been surprised by the number of unknown applications that connect to their network? Shadow IT isn’t a new challenge, but the ability to keep track of unsanctioned IT has become more diffic...
Better Together: CMDB + CSPM = Cloud Native Cyber Asset Management
This blog was originally published by JupiterOne here. Written by Tyler Shields, JupiterOne. There is a lot of confusion out there when it comes to cloud native IT and cloud security tools. Things have gotten rather complicated over the last few years as we migrate our security and technology sta...
What is Gartner’s SASE Model, and How Will it Affect Your Cloud Security Stack?
By Chloe Whitaker Originally Published by Cisco on August 31, 2021 The way we think about networking and cybersecurity has changed dramatically in recent years. The rise of remote workers, coupled with the growing push of company data and infrastructure into the cloud, prompted Gartner to outli...
How Can You Protect Yourself from Data Leaks?
Written by Romain Coussement, Cloud security expert at Fortica Leaks of sensitive data were prominent in the news in the summer of 2019 and the months that followed. One after the other, large companies saw their customers’ sensitive data exposed on the Internet. How can you mitigate the threat...
How US Federal Government Proposals Promote Zero Trust Network Access
This blog was originally published by Bitglass here. Written by Jonathan Andresen, Bitglass. As part of the mandates from President Joe Biden’s May 12th Executive Order on Improving the Nation’s Cybersecurity the Office of Management and Budget (OMB) is giving agencies until the end of October to...
SaaS Insecurity: How to Regain Control
By Andrew Sweet, AppOmni. Is your SaaS environment running? Then you better go catch it! Or, better yet, secure it. Jokes aside, it’s common knowledge these days that SaaS environments are popular for their agility and scalability, helping businesses streamline operations, improve customer...
Are You On a Security Service Edge (SSE) Journey?
This blog was originally published by Bitglass here.Written by Mike Schuricht, Bitglass.Last month, in the latest Gartner “Hype Cycle for Network Security, 2021” by Shilpi Handa and Pete Shoard, Security Service Edge (SSE) was introduced. This segment was not only “High” on the Benefit scale and ...
The Future of Work is Hybrid – Is Your Security Ready?
This blog was originally published by Bitglass here.Written by Jonathan Andresen, Bitglass.It wasn’t that long ago that most of us used to work in an office. Fifteen months into the global COVID pandemic it’s now certain that the future will not be a full return to the office or a continuation of...
Why IaaS Security Should be a Priority
This blog was originally published by Bitglass here. Written by Jonathan Andresen, Bitglass. Why are CIOs and IT organizations prioritizing investment in cloud infrastructure? The answer is simple: to better support virtual workforces, supply chains, and partners. Getting the most value out of le...
Six Key Characteristics of a Modern ZTNA Solution
This blog was originally published by Bitglass hereWritten by Jeff Birnbaum, BitglassEven as organizations continue adoption of cloud technologies, the need for secure access to on-premises resources has not gone away. In fact, as many companies navigate a return to the office while simultaneousl...
Will New Executive Order on Cybersecurity Fast Track Zero Trust?
This blog was originally published by Bitglass hereWritten by Jonathan Andresen, BitglassOn May 12, US President Biden issued a landmark executive order on Improving the Nation’s Cybersecurity that signals the need for governments and enterprises alike to boost their cyber defenses around the pri...
Better Together: The Future of CASBs and SWGs
This blog was originally published by Bitglass hereWritten by Jacob Serpa, BitglassWe’ve established before that cloud access security brokers (CASBs) and secure web gateways (SWGs) do not compete and are, in fact, complementary security tools. However, in addition to this, there is overlap betwe...
Complementing Your CSPM with Runtime Cloud Workload Protection
Written by IntezerThere are many solutions available for securing your cloud applications and workloads. Even after doing your due diligence and making an investment, it can take a long time to provide value. CISOs report Cloud Security Posture Management (CSPM) and other pre-runtie vulnerability...
Improving Data Security for SaaS Apps - 5 Key Questions every CISO needs to ask
By Matt Hines, VP of Marketing at CipherCloud & Neeraj Nayak, Sr. Product Marketing Manager at CipherCloud Summary: The rapid uptake of game-changing SaaS applications has been transforming the way organizations do business long before COVD-19 emerged and the remote workforce exploded overnight...
Diving Deeper: 4 Best Practices for Securing Enterprise Data in Office 365 (O365)
By Matt Hines, VP of Marketing at CipherCloud & Ishani Sircar, Product Marketing Manager at CipherCloudSo, here we are, both as workers and employers. The COVID-19 environment hasn’t really changed much from a workforce perspective over the last six months, other than the fact that more of us are...
Browse by Topic
Write for the CSA blog
Submit your blog proposalSign up to receive CSA's latest blogs
This list receives 1-2 emails a month.