Cloud 101
Circle
Events
Blog

Industry Insights

Read the latest cloud security news, trends, and thought leadership from subject matter experts.

Industry Insights
How to Contain Breaches in the Cloud
Published: 11/02/2022

Written by PJ Kirner, CTO and Co-Founder, Illumio. Hyperconnectivity, hybrid work and an increasingly distributed enterprise have all caused the modern attack surface to explode. In the past 2 years alone, 76 percent of organizations have been attacked by ransomware and 66 percent have experien...

Pivoting from Infrastructure Resilience to True Data Resilience
Published: 10/05/2022

Originally published by ShardSecure here. Written by Julian Weinberger, ShardSecure Sales Engineering & Partner Lead. Traditionally, we achieved resilience by making systems redundant with a primary data center and a backup data center that consisted of all the same infrastructure, devices, and...

You Could Do Zero Trust the Old-Fashioned Way, but Why?
Published: 10/04/2022

Originally published by CXO REvolutionaries here. Written by Kevin Schwarz, Transformation Strategist, ZScaler. Many organizations are trapped in an outdated way of operating and simply do not realize it. People, businesses, and agencies regularly use antiquated processes or technology, never ant...

How to Solve Complex Cloud Security Problems with AI
Published: 09/16/2022

Written by Morey J. Haber, Chief Security Officer, BeyondTrust. Artificial intelligence (AI) and, to a lesser extent, machine learning (ML) have become increasingly prevalent as a solution to solve complex cybersecurity problems. While the cloud has made this more practical due to shared resource...

Comments on the Extensible Visibility Reference Framework (eVRF) Program Guidebook
Published: 08/23/2022

Originally published by Gigamon here. Written by Orlie Yaniv and Ian Farquhar, Gigamon. Editor’s note: Gigamon is very happy to see the CISA’s recent work on formalizing and structuring what visibility means and assessing its efficacy. As Zero Trust accelerates, visibility becomes a key focu...

Adapting the Cloud Service Model to Today's Needs
Published: 07/19/2022

This blog was originally published by CXO REvolutionaries here. Written by Brett James, Director, Transformation Strategy, Zscaler. You may have come across the diagram below, or a version of it if you’ve done any research into cloud services (and not from under a rock). Figure 1: Clou...

Financial Services Turn to Confidential Computing for Key Use Cases
Published: 07/15/2022

This blog was originally published by Anjuna here. Why do highly regulated industries need the protection of Confidential Computing to secure personal data, MPC, and other applications?The very mention of today’s cloud-related financial risks raises goose-bumps: intensified money laundering campa...

Web Protocol - Uses Finite State Machine
Published: 07/15/2022

Written by Gregory Machler, Cybersecurity Engineer, Daikin Applied. In an attempt to improve the cybersecurity of the communications between a browser and web server, I’ve been mulling over session protocols. In prior thoughts last year, I commented on the use of TLS 1.3 to encrypt traffic betwee...

With Multi-Device Fido Credentials, You Can Now Go All-in on Passwordless
Published: 07/13/2022

This blog was originally published by CXO REvolutionaries here. Written by Maneesh Sahu, Senior Director, OT and IIoT Product Management, Zscaler. In a previous post, The Passwordless future has arrived, here are your options, I enumerated some options for app developers and end-users to use inst...

Preparing for Web 3.0
Published: 07/08/2022

This blog was originally published by Schellman here. Written by Scott Perry, Schellman. Ernest Cline’s sci-fi novel, Ready Player One, centers on users’ experience within the OASIS—a highly advanced, fully immersive simulation. In the book, people prefer living in virtual reality rather than the...

What a More Holistic Approach to Cloud-Native Security and Observability Looks Like
Published: 06/27/2022

This blog was originally published by Tigera here. Written by Laura Ferguson, Tigera. The rise of cloud native and containerization, along with the automation of the CI/CD pipeline, introduced fundamental changes to existing application development, deployment, and security paradigms. Because clo...

For Fun – Aligning or Putting Music to the Varieties of Efforts, Tasks, Work Roles, and Functions in Cybersecurity
Published: 05/27/2022

Produced by: Stan Mierzwa, M.S., CISSP, CCSK, Cloud Security Alliance NJ Chapter President Contributions by: Eliot Perez, Assistant Director Security, Transportation Industry and Cloud Security Alliance NJ Chapter Board Member Todd Edison, Chapter Relations Manager, Cloud Security Alliance ...

How to Architect for Sustainability in a Cloud Native Environment
Published: 05/16/2022

This blog was originally published by Contino here. Written by Scott McCracken, Contino. Recognising the impact we have on the environment is more important than ever and ensuring our businesses are sustainable is now paramount. Over the last year, more and more organisations have signed up to Th...

Handling the Challenge of Model Drift in Data Lakes
Published: 03/30/2022

Written by Dr. Nathan Green, Marymount University and Oliver Forbes, NTT DATA One of the most constant and evolving characteristics of the sharing of information, is data in its readable form and its various models of consumption. Machine learning is an impactful tool of analysis that plays a...

7 Technology Innovations That Will Impact Cybersecurity in 2022 and Beyond
Published: 03/27/2022

Cloud has become the foundation for launching new technologies. As these new technologies are developed and adopted by enterprises, they will increasingly impact cybersecurity. Help our industry start preparing for the future by informing yourself of the top emerging technologies to watch for.Vie...

Are You Ready for the Great Cybersecurity RESET?
Published: 02/14/2022

This blog was originally published by CXO REvolutionaries here. Written by Phil Armstrong, EVP & Global CIO (former). Have you heard about the “great cybersecurity RESET” yet? The reset is a new wave of activity and an emerging global trend centered around cybersecurity planning. Businesses aroun...

The Cyber Defense Matrix
Published: 02/11/2022

This blog was originally published by JupiterOne here. Written by Sounil Yu, CISO & Head of Research, JupiterOne. In a world where cybersecurity threats evolve and proliferate at dizzying speed, a confusing and disordered cybersecurity landscape makes it all too difficult to ensure that our asset...

Securing Data Lakes in a Data Centric World
Published: 01/14/2022

Written by Dr. Diane Murphy, Marymount University and Oliver Forbes, NTT DATA Data allows the business of today to optimize performance, investigate fraud and discover solutions to problems that we didn't even know the question to. At the heart of such are the inner workings of expansive data lak...

Building Confidence in Quantum-Resistant Algorithms: How much analysis is needed?
Published: 02/25/2021

Written Roberta Faux, Lead Author and Quantum-safe Security Working Group MemberThe CSA Quantum-Safe Security Working Group has produced a new white paper, “Confidence in Post Quantum Algorithms.” This paper attempts to measure the published analysis of post-quantum or quantum-resistant cryptogra...

Can Blockchains Survive the Quantum Computer?
Published: 02/09/2021

Suppose you were asked to rank the most significant innovations in IT over the last few years. What would come to your mind? It is very likely that both blockchain and quantum technologies would come close to the top of your list.Blockchains promise the secure exchange of digital assets (such as ...

Browse by Topic
Write for the CSA blog
Submit your blog proposal

Sign up to receive CSA's latest blogs

This list receives 1-2 emails a month.