Circle
Events
Blog

Industry Insights

Read the latest cloud security news, trends, and thought leadership from subject matter experts.

Industry Insights
Four Reasons for Alert Fatigue and How to Make It Stop
Published: 06/24/2022

This blog was originally published by LogicHub here. Written by Ryan Thomas, VP of Product Management, LogicHub. Alert (or alarm) fatigue is the phenomenon of becoming desensitized (and thus ignoring or failing to respond appropriately) to signals meant to warn us about emergencies.IT security...

Security as a Differentiator: How to Market the Secure Customer Experience
Published: 06/23/2022

This blog was originally published by Coalfire here.Written by Nathan DeMuth, Vice President, Cloud Services, Coalfire.Leveraging software development lifecycle security as a go-to-market differentiator is imperative in setting companies apart from competitors. As Coalfire’s Cloud Advisory Board ...

Cloud Security Risk Often Lingers - Why That Should Alarm You!
Published: 06/21/2022

Written by Tim Sedlack, Sr. Director, Product Management, BeyondTrust. I think you’d agree that, today, “The Cloud” is ubiquitous. If surveys are to be believed, most of us are using more than one cloud service provider (CSP) to achieve our goals of speed of service, simplicity, and (generally) c...

Best Practices for Effective Cloud Data Security
Published: 06/21/2022

This blog was originally published by Laminar here. Written by Andy Smith, Laminar. Digital transformation and the shift to the cloud have accelerated in the past couple of years due to COVID-19 and the remote, work-from-home business model. Gartner projects that companies will spend nearly $400 ...

How a Strong Identity Protection Strategy Can Accelerate Your Cyber Insurance Initiatives
Published: 06/20/2022

This blog was originally published by CrowdStrike here. Written by Narendran Vaideeswaran, CrowdStrike. The growth in frequency and severity of cyberattacks has caused organizations to rethink their security strategies. Major recent security threats, such as high-profile ransomware attacks and th...

What is Disaster Recovery as a Service? | 10 Benefits to DRaaS
Published: 06/18/2022

Written by the Security as a Service Working Group.PurposeBacking up, or making an extra copy of data in case of accidental deletion or corruption is often a standalone service. Disaster Recovery as a Service (DRaaS) is a cloud computing service model that allows organizations to back up data and...

How to Secure Kubernetes Pods Post-PSPs Deprecation
Published: 06/17/2022

This blog was originally published by ARMO here. Written by Amir Kaushansky, VP Product, ARMO. Kubernetes pods are the basic building blocks of Kubernetes. It's managing one or more tightly coupled application containers allowing them to share resources and networks. Pods are hosted on nodes, whi...

Why Cloud Native Requires a Holistic Approach to Security and Observability
Published: 06/16/2022

This blog was originally published by Tigera here. Written by Laura Ferguson, Tigera. Like any great technology, the interest in and adoption of Kubernetes (an excellent way to orchestrate your workloads, by the way) took off as cloud native and containerization grew in popularity. With that came...

Implementing Outsourced Cloud Monitoring
Published: 06/09/2022

This blog was originally published by Weaver here. Written by David Friedenberg, Senior Manager, IT Advisory Services, Weaver. If your organization has decided to hire an outsourced cloud monitoring service, it is important to consider how you will ensure that the services are delivered in the ri...

Shining a Light on Shadow Data: What It Is and How to Minimize It
Published: 06/07/2022

This blog was originally published by Polar Security here. Written by Roey Yaacovi, Polar Security. Shadow data can be defined as any data that is not available or subject to an organization’s centralized data management framework. Examples of shadow data include: Customer data that was copied fr...

Cloud Data Security - The Cost of Doing Nothing
Published: 06/07/2022

This blog was originally published by Laminar here. Written by Andy Smith, Laminar. The world has changed dramatically over the past couple of years—especially in the areas of business and technology. The COVID pandemic accelerated digital transformation and forced a shift to a remote or hybrid b...

Moving Beyond Best-of-Breed Into a Cloud-First World
Published: 06/06/2022

This blog was originally published by CXO REvolutionaries here. Written by Brett James, Director, Transformation Strategy, Zscaler. Typical IT infrastructure in days gone by consisted of racks upon racks of best-of-breed equipment filling niche applications. Shiny boxes from a variety of vendors ...

Every App Will Be Vulnerable. Security Needs to Be Automated Inside and Outside the App.
Published: 06/06/2022

This blog was originally published by Valtix here.Written by Vishal Jain, Co-Founder and CTO of Valtix.Recent vulnerabilities and customer conversations have made a few things crystal clear in the last few months:There is no such thing as an invulnerable app, so inline defenses protecting the app...

How to Reduce Risk and Secure Data With Security Service Edge (SSE)
Published: 06/02/2022

This blog was originally published by Lookout here.Written by Sundaram Lakshmanan, CTO of SASE Products at Lookout.There’s a new acronym in town: SSE, which stands for Security Service Edge. If this looks mighty similar to Secure Access Service Edge (SASE), it’s because they are closely related.W...

It's Time to Put AI to Work in Security
Published: 05/31/2022

This blog was originally published by LogicHub here. Written by Willy Leichter, LogicHub. While we’ve been talking about and imagining artificial intelligence for years, it only has recently started to become mainstream, and accepted for a wide range of applications – from healthcare analytics to...

5 Business Benefits of Serverless
Published: 05/29/2022

This blog was written by CSA’s Serverless Working Group.Serverless computing offers several business benefits over traditional cloud-based or server-centric infrastructure. Consider a cloud-native serverless architecture for your organization if you’re hoping to improve in any of the following ar...

For Fun – Aligning or Putting Music to the Varieties of Efforts, Tasks, Work Roles, and Functions in Cybersecurity
Published: 05/27/2022

Produced by: Stan Mierzwa, M.S., CISSP, CCSK, Cloud Security Alliance NJ Chapter President Contributions by: Eliot Perez, Assistant Director Security, Transportation Industry and Cloud Security Alliance NJ Chapter Board Member Todd Edison, Chapter Relations Manager, Cloud Security Alliance ...

DLP Approach for The Cloud is Broken: Here's Why and How to Solve It
Published: 05/27/2022

This blog was originally published by Polar Security here. Written by Nimrod Iny, Polar Security. Data Loss Prevention (DLP) is one of the long-standing and more traditional approaches to securing enterprise data. It can be either network or endpoint-based, each having their own unique benefits a...

Keys to the Kingdom: Single Sign-On (SSO) is Under Attack
Published: 05/27/2022

This blog was originally published by BitSight here. Written by Pedro Umbelino and Oran Moyal, BitSight. Single Sign-On (SSO) software provides users with access to multiple applications or datasets without requiring multiple logins. SSO software simplifies the user experience, helps orga...

Should You Monitor Your Cloud Assets Internally or Outsource the Job?
Published: 05/25/2022

This blog was originally published by Weaver here. Written by David Friedenberg, Senior Manager, IT Advisory Services, Weaver. Most organizations and industries now use cloud service providers, or CSPs, to host systems and services. This may take the form of laaS, PaaS, or Saas (see box), de...

Browse by Topic
Write for the CSA blog
Submit your blog proposal

Sign up to receive CSA's latest blogs

This list receives 1-2 emails a month.