Circle
Events
Blog

Industry Insights

Read the latest cloud security news, trends, and thought leadership from subject matter experts.

Industry Insights
Deception as a Form of Defense
Published: 01/04/2022

Written by Jordi Vilanova, Cloudtango With thousands of breaches occurring annually, organizations must get creative when it comes to building a comprehensive and adaptive security defense plan. Detecting threats early inside any environment is critical to prevent data exfiltration and other type...

Not All Visibility Is Created Equal – What Are You Looking For?
Published: 01/03/2022

This blog was originally published by Valtix here. Written by Vishal Jain, Valtix. For enterprises, security-related visibility in the cloud is critical. For many, especially as they try to gain an understanding of what they have in the cloud, how it’s set up, and what’s happening, often across m...

Microservices Architecture Patterns: Working Together to Secure the Cloud
Published: 12/27/2021

Written by the CSA Application Containers and Microservices Working GroupThe secure development of microservices relies on architecture patterns. In the following blog, review these microservices architecture patterns and note how many are able to work together to form a secure cloud system. The ...

Cloud Cost Optimization: A Pivotal Part of Cloud Strategy
Published: 12/23/2021

Written by Gaurav Aggarwal, Avanade. This article was originally published on Forbes. It has also been previously published by Avanade. Cloud has undoubtedly been one of the clear winners in the Covid-19-induced digital transformation journey for most companies. However, managing costs is one of ...

Single-Tenant Versus Multitenant SaaS Solutions: When Does it Matter?
Published: 12/22/2021

Written by Morey J. Haber, BeyondTrust Today, there are many cloud-native, software-as-a-service (SaaS) solutions, built and optimized for the cloud, from which to choose. Yet, many competing solutions continue to tout themselves as “cloud-based”, even though they really represent just a lift and...

Data Security is Physical Security
Published: 12/21/2021

This blog was originally published by Authomize here. Written by Gabriel Avner, Authomize. Online streaming platform Twitch was hacked last week and the memes were fantastic.In case you missed it, a hacker reportedly stole 125 GB of valuable data from the Amazon-owned streaming service. The stole...

What if We Saw an End to Alert Fatigue?
Published: 12/16/2021

This blog was originally published by Secberus here. Written by Fausto Lendeborg, Secberus. When a violation occurs, the alert isn’t a warning to investigate, it’s a warning to remediate. The challenge is knowing which alerts are the true violations. Enterprises should be less concerned with ...

Rethinking the Complex Economics of Cloud
Published: 12/14/2021

This blog was originally published by Booz Allen here. Written by Dan Tucker, Booz Allen. How to optimize cloud for enterprise valueIT and mission leaders often spend numerous budget planning cycles weighing the economics of on-premises versus cloud operations, and that’s completely understandabl...

How to Adhere to the AWS Well Architected Framework
Published: 12/10/2021

Originally Published on Fugue’s Website on November 24, 2021 By Becki Lee, Senior Technical Writer The Amazon Web Services Well-Architected Framework is a set of recommendations AWS provides for designing infrastructure for cloud applications and workloads. By following the guidance in the ...

5 Elements of a Strong Cloud Security Strategy
Published: 12/07/2021

This blog was originally published by Alert Logic here. Written by Antonio Sanchez, Alert Logic. Cloud security continues to be one of the top concerns for IT leaders. Over the last 18 months, cloud adoption has increased as organizations have aggressively pursued digital initiatives in respo...

3 Steps for Continuous Improvement in Cloud Security
Published: 12/06/2021

This blog was originally published by JupiterOne here. Written by Ashleigh Lee, JupiterOne. Relationships make life rich. Together, we can do so much more than a single person alone – inspire change on micro and macro levels, recover and restore hope from storms, practice empathy and compassio...

The Right Way To Address Multicloud Cybersecurity
Published: 11/30/2021

This blog was originally published by Booz Allen here. Written by Brad Beaulieu, Booz Allen. Tailoring security for multicloud’s unique challengesAs the industry’s cloud service vendors race to differentiate themselves with exclusive new features and innovations, federal agencies are riding the i...

Why Now is the Time for Chaos (Engineering)
Published: 11/30/2021

Written by Morey J. Haber, BeyondTrust. If you are old enough to remember the television show Get Smart, you may be familiar with the concept of applying chaos to provide order. While this spy show spoof mocked political stereotypes of the time for control versus chaos, the slapstick humor was de...

CISOs Need a Break. Your Security Tech Stack Should Provide It.
Published: 11/29/2021

By Fausto Lendeborg, Secberus. Chief information security officers of enterprise organizations face increasingly complex environments. Whether it’s: The constant presence of change, ITPro. says, “Security is one of the most complex parts of any organisation, and its parameters can chang...

Improving Customer Account Management with Security Transparency
Published: 11/26/2021

This blog was originally published by SafeBase here. Written by Kevin Qiu, SafeBase. According to the Identity Theft Research Center, data breaches increased year-over-year once again in 2021, with the number exceeding 2020's breaches by October. Supply chain security in particular is now top-of-...

Modernizing Security Operations with XDR
Published: 11/22/2021

This blog was originally published by Cisco here. Written by Aaron Sherrill, Senior Research Analyst at 451 Research. Set the Stage: A World Without XDRSecurity operations teams at most organizations are overwhelmed by the sheer number of security products they’re required to manage.Over the cour...

Building a Security Training Testbed for Azure
Published: 11/19/2021

This blog was originally published by Adobe here. Written by Akriti Srivastava, Security Analyst, Adobe OpSec Team. With any cloud platform, a lack of understanding of required security controls and unintentional misconfigurations can bring additional risk to the DevSecOps process. A test envi...

A Practical Guide to the Different Compliance Kubernetes Security Frameworks and How They Fit Together
Published: 11/18/2021

This blog was originally published by ARMO here. Written by Jonathan Kaftzan, ARMO. TL;DR - Comparing popular Kubernetes security and compliance frameworks, how they differ, when to use, common goals, and suggested toolsThe challenge of administering security and maintaining compliance in a Kuber...

3 Tenets For High-Performance Cloud Operations
Published: 11/15/2021

This blog was originally published by Booz Allen here. Written by Osama Malik, Booz Allen Hamilton. Unlock enterprise resilience, scale, and flexibilityThese days, with technology progressing at a rapid, continuous, unrelenting clip, cloud capabilities offer federal agencies a way to achieve and ...

Making the Security Conversation More “Feature-Driven”
Published: 11/10/2021

This blog was originally published by Adobe here. Written by Sandhya Narayan, Principal Program Manager, Adobe. A constantly changing security landscape driven by increasingly persistent threats, growing attack sophistication, and tighter compliance requirements keeps both security and product...

Browse by Topic
Write for the CSA blog
Submit your blog proposal

Sign up to receive CSA's latest blogs

This list receives 1-2 emails a month.