Industry Insights
Read the latest cloud security news, trends, and thought leadership from subject matter experts.

Types of IoT Cyber Risks
This blog was originally published by Agio here. The Internet of Things (IoT) has given us loads of valuable new devices, but it’s also created a new kind of security risk for organizations. Many people don’t see the danger posed by something as simple as a smart thermostat or lightbulb. So how d...
Predictions 2022: Five Threats That Will Impact Your Personal Data And Privacy
This blog was originally published by Lookout here. Written by Firas Azmeh, General Manager, Personal Digital Safety & Carrier Partnerships, Lookout. It will be increasingly difficult to tell what is legitimate online In Q1 of 2021, 4 in 10 people encountered an unsafe link while using their mob...
Why Is Cybersecurity Critical in Protecting Infrastructure?
Written by Angela Stone, Content Creator, Eleven Fifty AcademyCybersystems, assets, and physical infrastructure are vital to the economy of a country. Destroying or incapacitating infrastructure and cyber systems can have a devastating impact on the economy. Industries such as the oil and gas ind...
Taking a Practical Timely Opportunity to Evaluate the Security of Your Cloud Video Surveillance Solution
Written by Stan Mierzwa, M.S., CISSP, Director and Lecturer, Kean University Center for Cybersecurity and Eliot Perez, IT Security Analyst, CSA NJ Chapter These days, it is not unusual to walk too far before you see the endpoint of a video surveillance system. Consider the cameras you have s...
Behind the Scenes of the IoT Working Group with Mark Yanalitis
By CSA Staff and Mark Yanalitis Here at CSA, our working groups are the core of what we do. From researching best practices, to tackling challenges on the horizon, they bring together security professionals from diverse backgrounds and experiences to collaborate on research that will benefit the ...
Recommendations for IoT Firmware Update Processes: Addressing complexities in a vast ecosystem of connected devices
By Sabri Khemissa, IT-OT-Cloud Cybersecurity Strategist,ThalesTraditionally, updating software for IT assets involves three stages: analysis, staging, and distribution of the update—a process that usually occurs during off-hours for the business. Typically, these updates apply cryptographic contr...
Securing the Internet of Things: Devices & Networks
By Ranjeet Khanna, Director of Product Management–IoT/Embedded Security, Entrust Datacard The Internet of Things (IoT) is changing manufacturing for the better.With data from billions of connected devices and trillions of sensors, supply chain and device manufacturing operators are taking advant...
Securing the Internet of Things: Connected Cars
By Ranjeet Khanna, Director of Product Management–IoT/Embedded Security, Entrust DatacardEstablishing safety and security in automotive design goes far beyond crash test dummies.By 2022, the global automotive Internet of Things (IoT) market is expected to skyrocket to $82.79 billion – and manufac...
How the “Internet of Things” Will Feed Cloud Computing’s Next Evolution
David Canellos, PerspecSys president and CEOWhile the Internet of things is not a new concept (Kevin Ashton first coined the term in 1999 to describe how the Internet is connected to the physical world), it is just now becoming a reality due to some major shifts in technology.According to ABI Res...
Browse by Topic
Write for the CSA blog
Submit your blog proposalSign up to receive CSA's latest blogs
This list receives 1-2 emails a month.