Cloud 101
Circle
Events
Blog

Industry Insights

Read the latest cloud security news, trends, and thought leadership from subject matter experts.

Industry Insights
Verizon’s 2022 Mobile Security Index Report – Confirming What We All Suspected
Published: 09/14/2022

Originally published by Thales here. Written by Todd Moore, VP, Encryption Products, Thales.What happens when you combine a pandemic that forces most businesses into a remote work environment, coupled with increased mobile device use for many daily tasks? On the one hand, you get increased produc...

How to Protect Your Data When Ransomware Strikes
Published: 09/12/2022

Originally published by Lookout here. Written by Hank Schless, Senior Manager, Security Solutions, Lookout. Ransomware is not a new attack vector. In fact, the first malware of its kind appeared more than 30 years ago and was distributed via 5.25-inch floppy disks. To pay the ransom, the victim h...

Data Security Compliance in the Age of “Work from Anywhere, on Any Device”
Published: 08/29/2022

Originally published by Ericom here. Written by Peter Fell, Ericom. Customer protection and data security regulations vary significantly across industries and compliance requirements vary with them. Rigorously controlling sensitive data and safeguarding it against misuse, exposure and exfiltratio...

If a Recession Comes, Cut Cyber Professionals at Your Peril
Published: 08/10/2022

Originally published by CXO REvolutionaries here. Written by David Cagigal, CIO, State of Wisconsin (former).I was working for a utility company in 2008 when a bubble burst in the housing market and caused the economy to collapse. We were all asked to tighten our belts. I knew then that I had to ...

The State of Remote Work Offboarding Security
Published: 08/01/2022

Written by Marie Prokopets, Co-founder and COO, Nira. As companies switch to remote, distributed, and hybrid workforces, security risks related to offboarding have grown. When employees leave or change roles, organizations must protect their sensitive data from accidental or malicious data ex...

Gatekeepers to Gateopeners
Published: 07/07/2022

This blog was originally published by Laminar here. Written by Amit Shaked, Laminar. The past couple of years have been tragic and challenging as the world responded to COVID-19. One positive side effect of the pandemic however, has been the positive momentum of digital transformation, and the sh...

Achieving Zero Trust? One Size Does Not Fit All
Published: 06/20/2022

This blog was originally published by Lookout here.Written by Hank Schless, Senior Manager, Security Solutions, Lookout.How mobile and cloud technologies enable us to be reliableMore than a year of near-universal remote work has proven that many of us can reliably stay productive from anywhere — ...

Office Space: Cost Savings Hidden in Plain Sight
Published: 05/25/2022

This blog was originally published by CXO REvolutionaries here.Written by Craig Clay, Former Lead Connectivity Architect, Shell. Two recent megatrends have transformed our ideas about shared office space, likely forever. First, remote work has proven more effective than expected for many job role...

CISO to CISO: 3 Practical Tips to Protect Your Data in the Cloud
Published: 05/20/2022

Written by Marc Blackmer, ShardSecure. The explosion of remote work over the last two years has driven the rapid adoption of cloud services and, with that, a rise in threats and risk to enterprise data. Now that we know a hybrid work model is here to stay, organizations need to better understand ...

Focus on People, Process, and Technology to Secure Your Shadow IT
Published: 01/13/2022

Written by David Golding, AppOmni. Anyone in IT is familiar with shadow IT. How many times has an IT manager been surprised by the number of unknown applications that connect to their network? Shadow IT isn’t a new challenge, but the ability to keep track of unsanctioned IT has become more diffic...

Predictions 2022: Work-From-Anywhere Marks the Beginning of the End of On-Premises Security
Published: 01/04/2022

This blog was originally published by Lookout here. Written by Sundaram Lakshmanan, CTO of SASE Products, Lookout. A decade ago, many were reluctant to move to the cloud. Many felt like they would have to relinquish controls they had within their perimeters. That sentiment has since reversed, whe...

Achieving Zero Trust Remote Access with Privileged Access Management
Published: 11/19/2021

Written by Matt Miller, BeyondTrust. The radical shift to embrace largescale remote work—and even a work-from-anywhere mindset, the accelerated pace of digital transformation, the proliferation of ransomware, and massive breaches (i.e. SolarWinds Orion, Colonial Pipeline, etc.) together have kick...

Why Cloud-Ready, Centralized AppSec Must Underpin State Government Cloud Adoption
Published: 11/17/2021

This blog was originally published by Checkmarx here. Written by Rebecca Spiegel, Checkmarx. State and local governments are accelerating their use of the cloud as they focus on delivering more digital services with fewer resources and continue responding to pandemic pressures. In a recent Fe...

More on Targeted Attacks and How to Protect Against Them
Published: 11/05/2021

Written by Alex Vakulov. Small and big organizations often face targeted attacks. APT (Advanced Persistent Threat) groups improve the quality of their operations, causing more serious damage. Timely detection and response, training of personnel, and advanced training of information security depa...

Why Choose an MSSP
Published: 11/04/2021

This blog was originally published by Cloudtango here. Written by Cloudtango. Since the pandemic, working from home has become widely adopted across all type of businesses around the globe. As the memory of the pandemic starts to progressively fade, many predict remote working will remain in one ...

Modern Cybersecurity: Book Preface
Published: 11/04/2021
Author: Erkang Zheng

On October 19, 2021, JupiterOne published a book, "Modern Cybersecurity: Tales from the Near-Distant Future". This is an excerpt from the Preface. PrefaceCybersecurity is transforming. The last decade of cyberattacks, threat actors, and an endless stream of breached data was just a catnap compare...

Are You Still Having Problems Building Secure Remote Access?
Published: 10/25/2021

Written by Alex Vakulov In this article, I want to talk about the practical issues of implementing secure remote access as well as what is happening in the market, how regulators affect teleworking, and whether it is necessary to monitor employees who work from home. In the spring of last year, ...

The Future of Work is Hybrid – Is Your Security Ready?
Published: 08/25/2021

This blog was originally published by Bitglass here.Written by Jonathan Andresen, Bitglass.It wasn’t that long ago that most of us used to work in an office. Fifteen months into the global COVID pandemic it’s now certain that the future will not be a full return to the office or a continuation of...

​Securing a new world of hybrid work: What to know and what to do
Published: 06/16/2021

This blog was originally published by Microsoft Security here Written by Vasu Jakkal, Corporate Vice President, Security, Compliance and Identity, Microsoft The cybersecurity landscape has fundamentally changed, as evidenced by large-scale, complex attacks like Nobelium, Hafnium, and more rec...

Six Key Characteristics of a Modern Secure Web Gateway
Published: 04/29/2021

This blog was originally published by Bitglass here.As we head into the second quarter of 2021 and mark a full year of remote work for many organizations, it is clear that the COVID-19 pandemic has accelerated digital transformation globally and changed the future of work — likely permanently. A ...

Browse by Topic
Write for the CSA blog
Submit your blog proposal

Sign up to receive CSA's latest blogs

This list receives 1-2 emails a month.