Cloud 101

Industry Insights

Read the latest cloud security news, trends, and thought leadership from subject matter experts.

Industry Insights
IoT Vulnerabilities and Security Concerns
Published: 11/19/2022
Author: Megan Theimer

In Part 1 of this blog, we covered the many reasons that Internet of Things (IoT) security is needed and should be properly funded. Now, to help you understand how to design and develop IoT products securely, we will explain some of the challenges security engineers face when dealing with IoT dev...

IoT Security: Why We Need to Develop Secure IoT Devices
Published: 11/05/2022
Author: Megan Theimer

Internet of Things (IoT) devices represent a wide variety of non-traditional, internet connected devices such as medical devices, cars, drones, simple sensors, and more. These devices often pose a security challenge due to their limited size and the inability to secure them with traditional secur...

What is IoT Security?
Published: 09/25/2022
Author: Nicole Krenz

Internet of Things (IoT) devices describe a variety of non-traditional, physical objects including medical devices, cars, drones, simple sensors, and more. IoT represents objects that exchange data with other systems over the internet or other networks. IoT security is the practice of securing th...

Edge Computing and IoT: Security Through Zero Trust
Published: 09/13/2022

Originally published by CXO REvolutionaries here. Written by Bryan Green, Chief Information Security Officer, Zscaler. Though they're often used interchangeably, internet of things (IoT) and operational technology (OT) refer to adjacent but fundamentally different technologies. Both share common ...

The Standout Cybersecurity Stats You Need to Know
Published: 09/07/2022

Find Part 1 of this blog, "Trends in Cybersecurity Breaches," here. The complete blog was originally posted by Alert Logic on July 7, 2022. Written by Antonio Sanchez. How rampant is cybercrime today? The prevalence of cybercrime is enormous. More than one-third of organizations have experien...

Types of IoT Cyber Risks
Published: 05/20/2022

This blog was originally published by Agio here. The Internet of Things (IoT) has given us loads of valuable new devices, but it’s also created a new kind of security risk for organizations. Many people don’t see the danger posed by something as simple as a smart thermostat or lightbulb. So how d...

Predictions 2022: Five Threats That Will Impact Your Personal Data And Privacy
Published: 03/09/2022

This blog was originally published by Lookout here. Written by Firas Azmeh, General Manager, Personal Digital Safety & Carrier Partnerships, Lookout. It will be increasingly difficult to tell what is legitimate online‍ In Q1 of 2021, 4 in 10 people encountered an unsafe link while using their mob...

Why Is Cybersecurity Critical in Protecting Infrastructure?
Published: 06/09/2021

Written by Angela Stone, Content Creator, Eleven Fifty AcademyCybersystems, assets, and physical infrastructure are vital to the economy of a country. Destroying or incapacitating infrastructure and cyber systems can have a devastating impact on the economy. Industries such as the oil and gas ind...

Taking a Practical Timely Opportunity to Evaluate the Security of Your Cloud Video Surveillance Solution
Published: 03/10/2021

Written by Stan Mierzwa, M.S., CISSP, Director and Lecturer, Kean University Center for Cybersecurity and Eliot Perez, IT Security Analyst, CSA NJ Chapter These days, it is not unusual to walk too far before you see the endpoint of a video surveillance system. Consider the cameras you have s...

Behind the Scenes of the IoT Working Group with Mark Yanalitis
Published: 01/15/2020

By CSA Staff and Mark Yanalitis Here at CSA, our working groups are the core of what we do. From researching best practices, to tackling challenges on the horizon, they bring together security professionals from diverse backgrounds and experiences to collaborate on research that will benefit the ...

Recommendations for IoT Firmware Update Processes: Addressing complexities in a vast ecosystem of connected devices
Published: 09/20/2018

By Sabri Khemissa, IT-OT-Cloud Cybersecurity Strategist,ThalesTraditionally, updating software for IT assets involves three stages: analysis, staging, and distribution of the update—a process that usually occurs during off-hours for the business. Typically, these updates apply cryptographic contr...

Securing the Internet of Things: Devices & Networks
Published: 03/12/2018

By Ranjeet Khanna, Director of Product Management–IoT/Embedded Security, Entrust Datacard The Internet of Things (IoT) is changing manufacturing for the better.With data from billions of connected devices and trillions of sensors, supply chain and device manufacturing operators are taking advant...

Securing the Internet of Things: Connected Cars
Published: 03/05/2018

By Ranjeet Khanna, Director of Product Management–IoT/Embedded Security, Entrust DatacardEstablishing safety and security in automotive design goes far beyond crash test dummies.By 2022, the global automotive Internet of Things (IoT) market is expected to skyrocket to $82.79 billion – and manufac...

How the “Internet of Things” Will Feed Cloud Computing’s Next Evolution
Published: 06/05/2013

David Canellos, PerspecSys president and CEOWhile the Internet of things is not a new concept (Kevin Ashton first coined the term in 1999 to describe how the Internet is connected to the physical world), it is just now becoming a reality due to some major shifts in technology.According to ABI Res...

Browse by Topic
Write for the CSA blog
Submit your blog proposal

Sign up to receive CSA's latest blogs

This list receives 1-2 emails a month.