Cloud 101
Circle
Events
Blog

Industry Insights

Read the latest cloud security news, trends, and thought leadership from subject matter experts.

Industry Insights
What It Means When We Say “It’s Encrypted”
Published: 12/16/2022

Originally published by ShardSecure. Written by Julian Weinberger, Sales Engineering & Partner Lead, ShardSecure. In the realm of digital security, the term “encryption” is thrown around all the time. But encryption is not always the actual technique being leveraged. Instead, encryption has...

Cloud First, Security Second?
Published: 11/22/2022

Originally published by Thales. Written by Chad Couser, Director, Marketing Communications, Thales. Cloud solutions were a lifesaver for organizations during the height of the COVID-19 pandemic as employees worked remotely or went hybrid and businesses pivoted their technology strategies to keep ...

Keeping Your Digital Destiny Firmly in Your Hands
Published: 10/06/2022

Written by Welland Chu, Ph.D, CISA, CISM. What Are the Top Priorities for Governments and Regulated Industries? Great minds think alike. When it comes to cloud adoption, what are the 3 aspects that the governments and regulators of Japan, Australia, Europe, Hong Kong, India, and Singapore ha...

Crypto Done Right
Published: 09/09/2022

Written by Debra Baker Ever wonder what cryptographic algorithms to use? What is better for symmetric encryption, AES-CTR or AES-CBC? For that matter what is symmetric encryption. Is ECDSA or RSA better for encryption? It can quickly get confusing. In fact, there was a study done on the Usabili...

Cloud Key Management 101: Cryptographic Keys and Algorithms
Published: 08/17/2022
Author: Megan Theimer

.The top cloud security threat in 2022 is insufficient identity, credential, access, and key management. Key Management Systems (KMS), including hardware security modules and other cryptographic tools, are commonly used to address this threat. While different KMS offerings provide varying capabil...

With Multi-Device Fido Credentials, You Can Now Go All-in on Passwordless
Published: 07/13/2022

This blog was originally published by CXO REvolutionaries here. Written by Maneesh Sahu, Senior Director, OT and IIoT Product Management, Zscaler. In a previous post, The Passwordless future has arrived, here are your options, I enumerated some options for app developers and end-users to use inst...

How to Protect Your Crypto from Hackers
Published: 06/29/2022

This blog was originally published by TokenEx here.Written by Valerie Hare, Content Marketing Specialist, TokenEx.A McAfee report, "The Hidden Costs of Cybercrime," states that over $4 billion in cryptocurrency was stolen and nearly $1.4 billion was stolen in the first five months of 2020. While ...

#1 Threat to Cloud Computing: Insufficient Identity, Credential, Access, and Key Management
Published: 06/25/2022

Written by the CSA Top Threats Working Group.The CSA Top Threats to Cloud Computing Pandemic Eleven report aims to raise awareness of threats, vulnerabilities, and risks in the cloud. The latest report highlights the Pandemic Eleven top threats, in which the pandemic and the complexity of workloa...

Know Your Cloud Security Acronyms: CWPP, CSPM, CIEM and CNAPP
Published: 05/20/2022

This blog was originally published by Orca Security here. Acronyms help communicate lengthy phrases, but they can sometimes be confusing. This is especially true in the security industry, which has an alphabet soup of acronyms that can make even seasoned practitioners feel lost.One of the new acr...

As You Move to the Cloud, Make Sure Your PKI Goes with You
Published: 04/26/2022

This blog was originally published by Entrust here. Written by Samantha Mabey, Product Marketing Management Director, Certificate Solutions at Entrust. I’m sure most of us have heard the buzz around “multi-cloud” or “hybrid cloud.” But what exactly does it mean? And more importantly, what does it...

Ownership, Control and Possession – Options for Key Management in the Cloud
Published: 03/24/2022

This blog was originally published by Entrust here. By Iain Beveridge, Senior Product Marketing Manager, Data Protection Solutions at Entrust. My favourite scene from mid-80’s movie Ferris Bueller’s Day Off, was when Ferris (Matthew Broderick) and his friends roll into a rather shady looking va...

Leapfrog Your Cloud Migration – Don’t Let a Skills Shortage Stifle Business Possibilities
Published: 03/10/2022

This blog was originally published by Entrust here. Written by Juan Asenjo, PH.D., CISSP, Director of Product, Solutions and Partner Marketing at Entrust. Most of you will be familiar with the term leapfrog. Stemming from a children’s game, it’s an expression used not only in English, but also ...

Payments 101: Card Networks & Transactions
Published: 03/09/2022

This blog was originally published by VGS here. Written by Kenneth Geers, PhD, Information Security Analyst at VGS. Accounting is one of the oldest professions, as evidenced by financial records four times older than the Great Pyramids of Egypt. “Tally marks” etched into the thigh bone of a baboo...

Pfizer IP Leak Isn’t Unique. Protect Your Cloud Data With Proactive Encryption.
Published: 02/25/2022

This blog was originally published by Lookout on December 17, 2021. Written by Hank Schless, Senior Manager, Security Solutions, Lookout. The pharmaceutical company Pfizer recently acknowledged that thousands of internal documents were leaked, including trade secrets related to its COVID-19 vacci...

What Are the Security Challenges with BYOK for Hybrid Cloud Users?
Published: 11/08/2021

This blog was originally published by Unbound Security here. Written by Lior Levy, Unbound Security. Refer to Unbound Security's webinar on November 18, 2021 for more information about key management and cryptography.Moving to the cloud usually brings several advantages, such as flexibility, scal...

Think Your Data is Secure? Three Questions You Need to Answer Right Now
Published: 09/24/2021

Written by Yaki Faitelson, Co-Founder and CEO of Varonis. As organizations become more data driven, they store more data in more places and access it in more ways -- with phones, tablets and laptops. These ever-connected endpoints serve as gateways to large, centralized troves of sensitive infor...

The Adoption of Multi-Cloud Drives the Need for Better Data Protection and Management of Encryption Keys and Policy Controls
Published: 09/17/2021

This blog was originally published by Entrust here.Written by Jim DeLorenzo, Entrust.Enterprise adoption of multiple cloud platforms continues in earnest, whether it’s aimed at improving collaboration, reducing datacenter footprint, increasing customer response times or any number of other busine...

Split Knowledge: Literally the Key to Secure Encryption
Published: 06/25/2021

This blog was originally published by CyberCrypt here.When you store your valuable items in a safe deposit box, do you leave your key to that box with the bank? Of course not. Although you might trust your banker, you keep control of that key. Otherwise, if it fell into the wrong hands, you might...

How to Ensure Data Protection in Multi-Cloud
Published: 05/12/2021

This blog was originally published by CyberCrypt here.Multi-cloud setups pose a handful of challenges: data ownership, control and responsibility are shared among different CSPs and different regions, leaving open the door to misconfigurations and increasing the attack surface available to malici...

​Developing Key Management Systems
Published: 04/09/2021

Based on a publication written by the Cloud Key Management Working GroupKey management is the management of cryptographic keys in a cryptosystem. A reliable key management system (KMS) helps a business meet compliance and data control requirements, and also benefits the overall security of the or...

Browse by Topic
Write for the CSA blog
Submit your blog proposal

Sign up to receive CSA's latest blogs

This list receives 1-2 emails a month.