Industry Insights

Read the latest cloud security news, trends, and thought leadership from subject matter experts.

Industry Insights
And Again About 5G Network Security
Published: 05/04/2021

Written by David Balaban5G network capabilities go beyond the highest ever speed of mobile internet connection. The new mobile communication standard can become a universal infrastructure for interaction between people, smart devices, organizations, and even the economy's sectors.Such total conne...

A New Resource for API Security Best Practices
Published: 04/30/2021

The applicative infrastructure is becoming more and more complex due to different requirements, design patterns, and technologies. In many of these cases, one of those requirements is to connect other parties to systems, and in other cases, to connect systems to other parties. Nowadays, the most ...

Six Key Characteristics of a Modern Secure Web Gateway
Published: 04/29/2021

This blog was originally published by Bitglass here.As we head into the second quarter of 2021 and mark a full year of remote work for many organizations, it is clear that the COVID-19 pandemic has accelerated digital transformation globally and changed the future of work — likely permanently. A ...

Cloud-Native Security 101
Published: 04/19/2021

This blog was originally published by Intezer.The arrival of the cloud has changed the application development process. Agile cloud-native applications have replaced traditional monolithic application architectures, and components are no longer bundled into a single server. This transformation ha...

Why Remote Browser Isolation (RBI), Why Now?
Published: 04/14/2021

This post was originally published on Ericom's blog here.Written by Dr. Chase Cunningham, EricomRemote Browser Isolation, aka RBI, was more of a “fringe” technology when it first came on the scene. I wrote about RBI a few years ago while working as an analyst. At that time, it was noted as someth...

​Developing Key Management Systems
Published: 04/09/2021

Based on a publication written by the Cloud Key Management Working GroupKey management is the management of cryptographic keys in a cryptosystem. A reliable key management system (KMS) helps a business meet compliance and data control requirements, and also benefits the overall security of the or...

​Cloud-Native Security Starts with the Cloud
Published: 04/07/2021

Oracle author: Maywun Wong, Director, Product MarketingContributed by: Frank Dickson, IDC, Program Vice President, Security & Trust“Cloud-native security!” is the battle cry of the day. We all want it. But what is it? Everyone seems to define it differently. My suggestion is that any discussi...

Beware of Legitimate, but Compromised Websites
Published: 03/30/2021

This blog was originally published by Ericom By Mendy Newman, Group CTO, International, Ericom SoftwareIt’s easy to get lulled into a false sense of security when visiting a website you know – “I navigated directly to xyz.com so I know this isn’t a spoofed site. Surfing here, even downloading thi...

How SDP Can Be Used to Thwart DDoS Attacks
Published: 03/26/2021

By Shamun Mahmud, Senior Research Analyst and Standards Officer for the Cloud Security AllianceSoftware Defined Perimeter provides an integrated security architecture that is otherwise hard to achieve with existing security point products. We’ve seen tremendous growth in interest, enterprise adop...

Planning Through Recovery: Five Things to Keep in Mind
Published: 03/23/2021

By Bryan Sartin, Senior Vice President, Chief Services Officer, eSentirePlanning is everything. Just ask the Boy Scouts. While being caught in a downpour without an umbrella is certainly inconvenient, maybe even unpleasant, it pales in comparison to your organization experiencing a significant da...

Investment in Cybersecurity During a Recovering Economy
Published: 03/17/2021

This blog was originally published by TokenEx.Written by Alex Pezold, Co-Founder and CEO at TokenEx.Over a year of economic uncertainty driven by the pandemic has led organizations to re-evaluate their budgets. If one thing is apparent, it is that investing in cybersecurity must be a top priority...

Taking a Practical Timely Opportunity to Evaluate the Security of Your Cloud Video Surveillance Solution
Published: 03/10/2021

Written by Stan Mierzwa, M.S., CISSP, Director and Lecturer, Kean University Center for Cybersecurity and Eliot Perez, IT Security Analyst, CSA NJ Chapter These days, it is not unusual to walk too far before you see the endpoint of a video surveillance system. Consider the cameras you have s...

How to Secure Your CDE and Achieve PCI DSS Compliance
Published: 02/18/2021

Written by TokenExSuccessfully securing cardholder data should be top of mind as businesses try to keep up with the rise of data regulations and the resulting increased focus on consumer privacy. The process of securing a cardholder data environment (CDE) and ensuring it is compliant with the Pay...

How to choose a Zero Trust architecture: SDP or Reverse-Proxy?
Published: 02/15/2021

This blog was originally published on Wandera.comWritten by Alex Wells at WanderaZero Trust Network Access (ZTNA) is the next generation access solution that is set to be a key part of IT administrators toolkits, displacing longstanding Virtual Private Networks (VPN). There are numerous factors a...

Abuse in the Cloud
Published: 02/12/2021

Written By: Allan Stojanovic and Spencer Cureton from Salesforce, Inc.Join the new Cloud Abuse Circle Community, to participate in the discussion around this topic..When we talk about “abuse”, we use the term as shorthand for the much more encompassing “Abuse, Misuse, Malice and Crime” (with cred...

​3 Data Strategies that will be Critical for Surviving 2021
Published: 02/05/2021

By: Jim McGann, Vice President Marketing and Business Development, Index EnginesUsers create content on a daily basis. Much of this content has no long-term value and is not business critical, however, a small percentage is key to running operations. Some of it contains sensitive client informa...

2020 Hindsight and 2021 Foresight – Lessons Learned and Predictions for the Velocity of Business
Published: 02/01/2021

By Ravi Balupari, Founder & CTO, CloudVector This blog originally was published by CloudVectorThey say that hindsight is 2020, which has certainly been the case this year. For most organizations, 2020 orchestrated a fundamental shift to the way we work. The paradigm shift to work from home ha...

Cloud Workload Security: Part 4 - Explaining the Security Features of GCP
Published: 01/28/2021

Written by IntezerWhen it comes to securing your workloads in the cloud, having a well-defined security strategy with the right controls means that the battle is only half won. This series explains the important security controls and categories that can help you build a strong cloud security stra...

Tokenization vs. Encryption: Which is Better for Your Business?
Published: 01/06/2021

Written by TokenExFinding the right security technology for your company's data can be difficult. There are myriad options and a lot of industry terms and jargon thrown around without much reliable information with which to make a smart business decision. To assist with this process, we're going ...

Security Policies | Q&A with TokenEx Industry Experts
Published: 12/10/2020

Contributed by TokenExSecurity Policies | What You Need to KnowWhat is a Security Policy?Security policies are internal frameworks that formally document an organization’s requirements for the safe handling of sensitive information and assets. Effective security policies tend to be developed for ...

Browse by Topic