Industry Insights

Read the latest cloud security news, trends, and thought leadership from subject matter experts.

Industry Insights
What an Auditor Should Know about Cloud Computing Part 1

Published: 04/06/2021

An Introduction to Cloud Terminology and General GovernanceWritten by Moshe Ferber, CCSK and CCAK InstructorThis is the first in a series of three blogs dealing with the essentials an auditor needs to know about cloud computing. In recent years, there has been a strong focus on building cloud pla...

PCI Compliance Checklist: Ensure Compliance

Published: 03/08/2021

Originally published on TokenEx's blog. You’ve heard about all of the breaches. You know no defense is impenetrable. And you’re likely aware of the risk that comes with storing payment card information.Still, you need to process cardholder data to run your business—that much is unavoidable. So, h...

Transforming Your IT Risk Management from Reactive to Proactive in 5 Steps

Published: 03/04/2021

This blog was originally published on Hyperproof's blog.Written by Jingcong Zhao, Director of Content Strategy at HyperproofAs a seasoned IT risk management professional, you already know that staying on top of security is a constant battle. You probably also know that managing IT risks proactive...

​CSA STAR Attestation and STAR Certification Case Studies

Published: 02/28/2021

As organizations look to cloud services to process more sensitive and critical data, security and risk management teams require tools to quickly assess and understand the types and rigor of security controls applied by cloud service providers. The CSA STAR Attestation and Certification are the fi...

How to Secure Your CDE and Achieve PCI DSS Compliance

Published: 02/18/2021

Written by TokenExSuccessfully securing cardholder data should be top of mind as businesses try to keep up with the rise of data regulations and the resulting increased focus on consumer privacy. The process of securing a cardholder data environment (CDE) and ensuring it is compliant with the Pay...

What is 3-D Secure Authentication, and Why Do I Need It?

Published: 02/11/2021

Written by Dillon Phillips at TokenExThanks to the increasing popularity of ecommerce platforms, many card transactions that previously would have occurred in person can now be made online. The resulting rise in card-not-present (CNP) payments offers greater convenience for those initiating the t...

The CSA Cloud Controls Matrix (CCM) V4: Raising the cloud security bar to the next level

Published: 01/21/2021

Written by: Daniele Catteddu, Chief Technology Officer, Cloud Security Alliance and Lefteris Skoutaris, CCM Program Manager, Cloud Security AllianceOver the course of the last decade since its first appearance in 2010, the Cloud Controls Matrix (CCM) has become a reference for any organization se...

Using CSA STAR to Improve Cloud Governance and Compliance

Published: 12/19/2020

By John DiMaria, Assurance Investigatory Fellow, Cloud Security AllianceThe more complex systems become, the less secure they are, even though security technologies improve. There are many reasons for this, but it can all be traced back to the problem of complexity. Why? Because we give a lot of ...

How Does PCI DSS Protect Cardholder Data?

Published: 12/17/2020

By Branden Marrow from TokenEx The Payment Card Industry Data Security Standard (PCI DSS) is a payment industry security regulation developed, maintained, and enforced by the Payment Card Industry Security Standards Council (PCI SSC) to protect cardholder data (CHD). The council tasks organizati...

Migrating to the Cloud: Compliance Issues When Transitioning from a Traditional Data Center

Published: 12/16/2020

Written by IntezerFor traditional data center operations, security and compliance requirements have always been operational overhead. Traditional data centers are under unique stresses in today’s world. There are pressures to make data centers more flexible and adaptable to business needs—such as...

What is Cloud-Based Tokenization?

Published: 11/17/2020

By Dillon Phillips from TokenExAs more technologies migrate to the cloud in pursuit of digital transformation, security is no exception. Many people are likely familiar with the term "cloud," but not everyone knows just what is cloud security. Overall, cloud computing offers an effective, afforda...

​California Privacy Rights Act: What Are the Consequences for Cloud Users?

Published: 11/13/2020

Francoise Gilbert, DataMinding, Inc.California voters approved Proposition 24 on November 3, 2020, paving the way to the California Privacy Rights Act (CPRA), which, on January 1, 2023, will replace California’s current data protection law, the California Consumer Privacy Act (CCPA). CPRA slightl...

6 Data Governance Best Practices in 2020

Published: 10/27/2020

By Dillon Phillips from TokenExData governance is an essential practice in today’s digital landscape, but it's a broad topic that needs to be deeply understood in order to be implemented efficiently and effectively. Building on the information we introduced in our previous post (“What is Data Gov...

​Vendor Management Software Evaluation: How to Get Executive Buy-In

Published: 10/23/2020

Written by WhisticFor most InfoSec teams, the benefits of a vendor risk management platform are well defined. From making it easier to mitigate third-party risk to ensuring your internal team and external vendors are on the same page, vendor management software is a must-have in today’s open-sour...

What is the Cloud Controls Matrix (CCM)?

Published: 10/16/2020

By Eleftherios Skoutaris, Program Manager for CCM Working Group at Cloud Security AllianceWhat is the Cloud Controls Matrix?The CSA Cloud Controls Matrix (CCM) is a cybersecurity control framework for cloud computing. It is a spreadsheet that lists 16 domains covering all key aspects of cloud tec...

Is your vendor platform future proof?

Published: 09/21/2020

Written by WhisticIn the last few years, the InfoSec and data privacy sectors have grown exponentially. From on-premise hardware and servers to fully adopting cloud-based, SaaS-focused security workflows, the InfoSec world of 2020 looks much different from ten years ago. If you’re like most InfoS...

What is Third Party Risk and Why Does It Matter?

Published: 09/14/2020

Written by WhisticIn the world of information security, third party risk is a topic that comes up often. As more and more organizations turn to SaaS-based vendors and move their operations to a cloud-driven environment, third party risk has become one of the most critical topics for an organizati...

Enabling Data Protection and Compliance in the G Suite Environment

Published: 08/21/2020

By Matt Hines, VP of Marketing at CipherCloud & Ishani Sircar, Product Marketing Manager at CipherCloudThe Rise of G Suite and Related Data Security ChallengesWith over 2 billion active users and a market share of 56.97 percent, G Suite is here to stay nd help enable today’s businesses to tac...

What Schrems 2 Means for your Privacy Shield Program

Published: 08/10/2020

By Francoise Gilbert, CEO, DataMinding, Inc.The publication of the EU Court of Justice decision in the Schrems 2 case has left many organizations, worldwide, facing a difficult dilemma. What to do next to ensure the continuity of personal data flows from the European Union or European Economic Ar...

You’ve passed your SOX audit, but is your cloud environment really secure?

Published: 08/10/2020

By Petrina Youhan, Director of Channel Partnerships and Services at HyperproofCloud environments have unique risks that are not fully addressed by SOX. Additionally, while SOX does support good IT control hygiene, the actual scope of a SOX audit leaves out key security principles that are imperat...

Browse by Topic