Industry Insights

Read the latest cloud security news, trends, and thought leadership from subject matter experts.

Industry Insights
How to Protect Your Crypto from Hackers
Published: 06/29/2022

This blog was originally published by TokenEx here.Written by Valerie Hare, Content Marketing Specialist, TokenEx.A McAfee report, "The Hidden Costs of Cybercrime," states that over $4 billion in cryptocurrency was stolen and nearly $1.4 billion was stolen in the first five months of 2020. While ...

#1 Threat to Cloud Computing: Insufficient Identity, Credential, Access, and Key Management
Published: 06/25/2022

Written by the CSA Top Threats Working Group.The CSA Top Threats to Cloud Computing Pandemic Eleven report aims to raise awareness of threats, vulnerabilities, and risks in the cloud. The latest report highlights the Pandemic Eleven top threats, in which the pandemic and the complexity of workloa...

Know Your Cloud Security Acronyms: CWPP, CSPM, CIEM and CNAPP
Published: 05/20/2022

This blog was originally published by Orca Security here. Acronyms help communicate lengthy phrases, but they can sometimes be confusing. This is especially true in the security industry, which has an alphabet soup of acronyms that can make even seasoned practitioners feel lost.One of the new acr...

As You Move to the Cloud, Make Sure Your PKI Goes with You
Published: 04/26/2022

This blog was originally published by Entrust here. Written by Samantha Mabey, Product Marketing Management Director, Certificate Solutions at Entrust. I’m sure most of us have heard the buzz around “multi-cloud” or “hybrid cloud.” But what exactly does it mean? And more importantly, what does it...

Ownership, Control and Possession – Options for Key Management in the Cloud
Published: 03/24/2022

This blog was originally published by Entrust here. By Iain Beveridge, Senior Product Marketing Manager, Data Protection Solutions at Entrust. My favourite scene from mid-80’s movie Ferris Bueller’s Day Off, was when Ferris (Matthew Broderick) and his friends roll into a rather shady looking va...

Leapfrog Your Cloud Migration – Don’t Let a Skills Shortage Stifle Business Possibilities
Published: 03/10/2022

This blog was originally published by Entrust here. Written by Juan Asenjo, PH.D., CISSP, Director of Product, Solutions and Partner Marketing at Entrust. Most of you will be familiar with the term leapfrog. Stemming from a children’s game, it’s an expression used not only in English, but also ...

Payments 101: Card Networks & Transactions
Published: 03/09/2022

This blog was originally published by VGS here. Written by Kenneth Geers, PhD, Information Security Analyst at VGS. Accounting is one of the oldest professions, as evidenced by financial records four times older than the Great Pyramids of Egypt. “Tally marks” etched into the thigh bone of a baboo...

Pfizer IP Leak Isn’t Unique. Protect Your Cloud Data With Proactive Encryption.
Published: 02/25/2022

This blog was originally published by Lookout on December 17, 2021. Written by Hank Schless, Senior Manager, Security Solutions, Lookout. The pharmaceutical company Pfizer recently acknowledged that thousands of internal documents were leaked, including trade secrets related to its COVID-19 vacci...

What Are the Security Challenges with BYOK for Hybrid Cloud Users?
Published: 11/08/2021

This blog was originally published by Unbound Security here. Written by Lior Levy, Unbound Security. Refer to Unbound Security's webinar on November 18, 2021 for more information about key management and cryptography.Moving to the cloud usually brings several advantages, such as flexibility, scal...

Think Your Data is Secure? Three Questions You Need to Answer Right Now
Published: 09/24/2021

Written by Yaki Faitelson, Co-Founder and CEO of Varonis. As organizations become more data driven, they store more data in more places and access it in more ways -- with phones, tablets and laptops. These ever-connected endpoints serve as gateways to large, centralized troves of sensitive infor...

The Adoption of Multi-Cloud Drives the Need for Better Data Protection and Management of Encryption Keys and Policy Controls
Published: 09/17/2021

This blog was originally published by Entrust here.Written by Jim DeLorenzo, Entrust.Enterprise adoption of multiple cloud platforms continues in earnest, whether it’s aimed at improving collaboration, reducing datacenter footprint, increasing customer response times or any number of other busine...

Split Knowledge: Literally the Key to Secure Encryption
Published: 06/25/2021

This blog was originally published by CyberCrypt here.When you store your valuable items in a safe deposit box, do you leave your key to that box with the bank? Of course not. Although you might trust your banker, you keep control of that key. Otherwise, if it fell into the wrong hands, you might...

How to Ensure Data Protection in Multi-Cloud
Published: 05/12/2021

This blog was originally published by CyberCrypt here.Multi-cloud setups pose a handful of challenges: data ownership, control and responsibility are shared among different CSPs and different regions, leaving open the door to misconfigurations and increasing the attack surface available to malici...

​Developing Key Management Systems
Published: 04/09/2021

Based on a publication written by the Cloud Key Management Working GroupKey management is the management of cryptographic keys in a cryptosystem. A reliable key management system (KMS) helps a business meet compliance and data control requirements, and also benefits the overall security of the or...

Are Cryptographic Keys Safe in the Cloud?
Published: 03/18/2019

By Istvan Lam, CEO, TresoritBy migrating data to the cloud, businesses can enjoy scalability, ease of use, enhanced collaboration and mobility, together with significant cost savings. The cloud can be especially appealing to subject-matter experts as they no longer have to invest in building and...

Browse by Topic
Write for the CSA blog
Submit your blog proposal

Sign up to receive CSA's latest blogs

This list receives 1-2 emails a month.