Circle
Events
Blog

Industry Insights

Read the latest cloud security news, trends, and thought leadership from subject matter experts.

Industry Insights
Secure Software Supply Chain: Why Every Link Matters
Published: 05/23/2022

This blog was originally published by Sysdig here. Written by Álvaro Iradier, Sysdig. The new threats in software development are not only related to the specific company itself. The whole software supply chain is a target for attackers and it is really important to make sure that we put all our ...

Getting Started with Kubernetes Ingress
Published: 05/23/2022

This blog was originally published by ARMO here. Written by Ben Hirschberg, VP R&D & Co-founder, ARMO. Kubernetes Ingress is one of today’s most important Kubernetes resources. First introduced in 2015, it achieved GA status in 2020. Its goal is to simplify and secure the routing mechanism of inc...

The One Cloud Threat Everyone Is Missing
Published: 05/19/2022

Blog originally published at fugue.co on April 22, 2022. Written by Josh Stella, Chief Architect at Snyk. Ask security professionals to name the biggest threat to their organizations’ cloud environments, and most won’t hesitate to give a one-word answer: misconfigurations. Technically, t...

Introducing Data Security Posture Management (DSPM) Platform
Published: 05/18/2022

This blog was originally published by Polar Security here. Written by Nimrod Iny, Polar Security. You’re a cloud-based company, your entire business model relies on cloud data and your cloud environment is VERY precious to you, correct? That’s why you invest all of your resources into protecting ...

Container Security Best Practices
Published: 05/10/2022

This blog was originally published by Sysdig here. Written by Álvaro Iradier, Sysdig. Sticking to container security best practices is critical for successfully delivering verified software, as well as preventing severe security breaches and its consequences.According to the 2020 CNFC Survey, 92 ...

Ultimate Guide to Observability: What It Is and How to Do It Well
Published: 05/06/2022

This blog was originally published by Contino here. Written by Matthew Macdonald-Wallace, Contino. The complexity of software systems is ever increasing; organisations need to invest in ensuring that their systems are operable.In this blog, we’re taking a deep dive into observability: what it is,...

The Five Universal Fundamentals for Securing Your Cloud
Published: 05/06/2022

This blog was originally published on fugue.co on April 7, 2022.Written by Josh Stella, chief architect at Snyk. The word “misconfiguration” can seem quite innocuous — an innocent mistake that’s easy to fix, like putting your car into drive while the parking brake is still engaged. You quickl...

Kubernetes Version 1.24: Everything You Should Know
Published: 04/29/2022

This blog was originally published by ARMO here. Written by Amir Kaushansky, ARMO. The first Kubernetes release of 2022 will be released on May 3rd. The new release, version 1.24, is full of enhancements, new features, and bug fixes.We’ve written this post so you can adjust your Kubernetes resour...

5 Benefits of Detection-as-Code
Published: 04/27/2022

This blog was originally published by Panther here. Written by Kartikey Pandey, Panther. How modern teams can automate security analysis at scale in the era of everything-as-code.TL;DR: Adopt a modern, test-driven methodology for securing your organization with Detection-as-Code.Over the past dec...

DevSecOps Best Practices for Vulnerability Management in the Cloud
Published: 04/22/2022

This blog was originally published by Vulcan Cyber here. Written by Natalie Kriheli, Vulcan Cyber. With DevSecOps best practices, teams can remain on top of their security controls while taking full advantage of everything the cloud has to offer. A growing trend in the cloud ecosystem, DevSecOps ...

Security Performance Reporting
Published: 04/20/2022

Command guidance for CISO-to-stakeholder communications Written by John Hellickson, Field CISO, Coalfire There is tremendous urgency for security professionals to do a better job at communicating security program performance to enterprise stakeholders and boards of directors. For the Coalfire ...

Why You Need Application Security Testing for Business-Critical Applications
Published: 04/14/2022

This blog was originally published by Onapsis here. This blog is about the importance of building secure business-critical applications with application security testing. While many organizations employ defense-in-depth security models to protect their critical systems, not enough consideration i...

Governing the Organization
Published: 04/13/2022

This blog was originally published by Coalfire here. Written by Matt Klein, Field CISO, Coalfire. Security is the biggest risk to business today. Managing security has become one of the hardest jobs in the enterprise, and failing to do so effectively can create opportunities for severe operationa...

20 DevSecOps Best Practices Across People, Process and Technology
Published: 04/12/2022

This blog was originally published by Contino here. Written by Marcus Maxwell, Contino. How can secure software be developed at speed and scale!?This is the ultimate IT paradox for modern global enterprise organisations: go faster and innovate. But always stay secure.DevSecOps is the answer to in...

Put Your Trust in the Stack
Published: 04/11/2022

This blog was originally published by Entrust here. Written by Wayne Lewandowski, Vice President of Sales, Entrust Data Protection Solutions. Breaches, infiltration, exfiltration, compromised privileges, and interrupted access to critical systems are all parts of a well-written espionage movie, o...

Kubernetes for Beginners – A Step-by-Step Guide
Published: 03/28/2022

This blog was originally published by Vulcan Cyber here. Written by Natalie Kriheli, Vulcan Cyber. For beginners, Kubernetes can seem pretty daunting. It offers a feature-rich, flexible, and extensible platform, but the downside is that Kubernetes security can be quite challenging. Any misconfigu...

The Top 22 Digital Transformation Trends To Look Out For In 2022
Published: 03/22/2022

This blog was originally published by Contino here. Written by Deepak Ramchandani, Contino. 2021 was a big year in the world of digital transformation. The pandemic continued to push businesses to accelerate their digital journeys. From data-driven sustainability initiatives to cloud-first remote...

DevSecOps: Mission-Critical to Enterprise Resilience
Published: 03/11/2022

This blog was originally published by Coalfire here. Written by Caitlin Johanson, Director, Application Security, Coalfire. Whatever tolerance we had for failure has been turned upside down in the cloud. The consequences, never greater. So, what’s the solution? Nothing is more important to en...

CAASM Should Be an Early Security Investment in Every CISO’s Playbook
Published: 03/07/2022

This blog was originally published by JupiterOne here. Written by Jasmine Henry, JupiterOne. It’s possible to improve your security posture on a shoestring budget. There are a growing number of open source tools for security and compliance, but there are also key areas to invest in at the beginni...

Kubernetes Security Best Practices: Definitive Guide
Published: 03/03/2022

This blog was originally published by ARMO here. Written by Jonathan Kaftzan, VP Marketing & Business Development, ARMO. IntroductionKubernetes, an open-source microservice orchestration engine, is well known for its ability to automate the deployment, management, and, most importantly, scaling o...

Browse by Topic
Write for the CSA blog
Submit your blog proposal

Sign up to receive CSA's latest blogs

This list receives 1-2 emails a month.