Cloud 101
Circle
Events
Blog

Industry Insights

Read the latest cloud security news, trends, and thought leadership from subject matter experts.

Industry Insights
Altruism in Information Security, Part 2: Identifying Hurdles Along the Path
Published: 12/01/2022

Originally published by Tentacle. Written by Matt Combs, Tentacle. Welcome back! If you’re joining me for the second part of this series, I’m assuming I didn’t turn you off with my optimistic and ‘rosy’ view of the Altruism-Information Security relationship. That, or you didn’t read Part 1 and ha...

Managing Operational Complexity in Multicloud Environments
Published: 11/29/2022

Written by Sandeep Shilawat, Cloud and IT Modernization Strategist, ManTech. Originally published on Forbes. With the benefits of cloud computing now clear, enterprises are racing to adopt cloud-based infrastructures.According to Synergy Research Group, spending on cloud computing exceeded spendi...

Cloud First, Security Second?
Published: 11/22/2022

Originally published by Thales. Written by Chad Couser, Director, Marketing Communications, Thales. Cloud solutions were a lifesaver for organizations during the height of the COVID-19 pandemic as employees worked remotely or went hybrid and businesses pivoted their technology strategies to keep ...

Inoculate Your Company Against Security Data Gaps to Develop Cyber Immunity
Published: 11/21/2022

Written by Arti Raman, CEO and Founder, Titaniam. Protecting sensitive customer data, or personally identifiable information (PII), is a high priority for companies in verticals ranging from financial services to healthcare and retail. Chief information security officers (CISOs) for these ind...

CSA Chapter Success Story: An Interview with the Japan Chapter Director
Published: 11/19/2022
Author: Megan Theimer

CSA’s chapters are made up of security professionals who volunteer to increase cloud security awareness in their local area and provide outreach for CSA research, education, and training resources. They work to solve cloud vulnerabilities and challenges by collaborating with other local experts i...

Anatomy of a Cyber Attack (and What You Can Do About It)
Published: 11/18/2022

Originally published by TrueFort. Written by Matt Hathaway, TrueFort. Security criminals know how IT and security operations work in organizations. They know and exploit common weaknesses. To effectively protect against them, security teams need to turn the tables and get inside the attackers’ br...

Access Controls that Move - The Power of Data Security Posture Management
Published: 11/18/2022

Originally published by Sentra. Controlling access to data has always been one of the basics of cybersecurity hygiene. Managing this access has evolved from basic access control lists, to an entire Identity and Access Management industry. IAM controls are great at managing access to applicatio...

Altruism in Information Security? (Part 1 of 3)
Published: 11/14/2022

Originally published by Tentacle. Written by Matt Combs, Tentacle. Altruism and Information Security; two terms not commonly used together - the first term not often used to describe the foundational philosophy of the latter. Altruism is ideological; a desired state of the ultimate do-gooder who...

Defining Cyber Immunity
Published: 11/10/2022

Written by Arti Raman, CEO and Founder of Titaniam. Biologically, a virus is something that inserts itself into the body of a living thing and replicates itself to infect its host. Technology can also be exposed to viruses – codes that replicate themselves with the ultimate goal to destroy da...

How Cybersecurity Asset Management Helps Amid Economic Uncertainty
Published: 11/09/2022

Originally published by Axonius. Written by Kathleen Ohlson, Axonius. Trying to understand, manage and protect the disparate parts that make up an IT infrastructure can be one of the biggest challenges — and headaches — for IT and cybersecurity professionals. With today’s increased economic uncer...

Cloud Data Security Means Shrinking the “Data Attack Surface”
Published: 11/08/2022

Originally published by Sentra. Traditionally, the attack surface was just the sum of the different attack vectors that your IT was exposed to. The idea being as you removed vectors through patching and internal audits. With the adoption of cloud technologies, the way we managed the attack surfac...

How to Accelerate Government Transformation by Reducing Risk, Complexity, and Cost
Published: 11/07/2022

Originally published by Thales. Written by Marcelo Delima, Senior Manager, Global Solutions Marketing, Thales. The days of dreadful long lines at crowded and inefficient government agencies may be coming to an end. Digitalization of services and adoption of new platforms are reinventing governmen...

Definitive Guide to Hybrid Clouds, Chapter 1: Navigating the Hybrid Cloud Journey
Published: 11/04/2022

Originally published by Gigamon. Written by Stephen Goudreault, Gigamon. This post explores Chapter 1 of the Definitive Guide™ to Network Visibility and Analytics in the Hybrid Cloud. Many organizations are deploying assets to the cloud, which is often the start of their cloud migration journey. ...

IAM and Security Automation: How Companies Can Stay Safer in the Cloud
Published: 11/01/2022

Originally published by ShardSecure. Written by Anthony Whitehead, Lead Developer, ShardSecure. Automation of security measures is a long-running topic of discussion. But despite the many benefits, including increased productivity, effectiveness, efficiency, and accuracy, many organizations hav...

Information Security Management and the Connectivity Gap: Solving for the Missing Links in Enterprise Information Security
Published: 11/01/2022

Originally published by Tentacle. Written by Danielle Morgan, Tentacle. Let’s start with the basics: a foundational definition of Information Security management is the process of developing, maintaining, and continuously improving processes aligned with the main goal of ensuring sensitive data i...

The Need for SAP Security in the Utilities Sector
Published: 10/27/2022

Originally published by Onapsis here. It’s no secret cyberattacks have become more advanced over the last few years. Industries that are critical to everyday life have seen, firsthand, the debilitating impact cyberattacks can have. Critical infrastructure, such as the informational technology (IT...

3 Reasons to Add Cloud Data Security to 2023 Cybersecurity Budgets
Published: 10/27/2022

Originally published by Laminar here. Written by Andy Smith, Laminar. Why Cloud Data Is So ImportantCloud data is growing at an exponential rate, and attackers have taken notice. Data breaches in 2021 increased by 68% over the year prior. As cloud data continues to grow, so too will the risk of a...

Data Security Posture Management vs Cloud Security Posture Management
Published: 10/26/2022

Originally published by Sentra here. It was only a few years ago that we thought ‘Cloud Security Posture Management’ was going to bring the ultimate level of security to the cloud. But we’re already discovering that while CSPM is doing a good job of finding infrastructure vulnerabilities, data ...

Why Gaming Companies Should Follow the MPA’s Lead
Published: 10/18/2022

Originally published by Ericom here. Written by Tova Osofsky, Ericom. Grand Theft Auto 6 Leaks Hit Rockstar Hard In the wake of what they characterized as a “network intrusion in which an unauthorized third party illegally accessed and downloaded… early development footage for the next Gran...

Top Threat #5 to Cloud Computing: Insecure Software Development
Published: 10/17/2022

Written by the CSA Top Threats Working Group.The CSA Top Threats to Cloud Computing Pandemic Eleven report aims to raise awareness of threats, vulnerabilities, and risks in the cloud. The latest report highlights the Pandemic Eleven top threats, in which the pandemic and the complexity of workloa...

Browse by Topic
Write for the CSA blog
Submit your blog proposal

Sign up to receive CSA's latest blogs

This list receives 1-2 emails a month.