Cloud 101
Circle
Events
Blog

Industry Insights

Read the latest cloud security news, trends, and thought leadership from subject matter experts.

Industry Insights
Understanding Data Protection Needs in a Cloud-Enabled Hybrid Work World
Published: 03/24/2023

Originally published by Netskope. Written by Carmine Clementelli. Netskope partnered with the Cloud Security Alliance to release the Data Loss Prevention (DLP) and Data Security Survey Report, a survey focused on data protection needs in cloud and hybrid work environments. Unsurprisingly, the...

Unity, Data, Focus, Culture: Important Steps to Build Organizational Resilience
Published: 03/03/2023

Originally published by Google Cloud. Written by Sahana Sarma, Managing Director, Customer Value and Transformation Advisory, Google Cloud. It takes the right mix of teamwork and technology to get organizational resilience right. Here's five steps to help jump-start the process. Organizational re...

Protecting Data and Promoting Collaboration During Times of Change
Published: 03/01/2023

Originally published by Lookout. Written by Hank Schless, Senior Manager, Security Solutions, Lookout. When it comes to the way we work, change is now the status quo — and it often happens so quickly that security teams have a tough time keeping up. Organizations that try to keep using their ...

Zero Trust Security: The Guide to Zero Trust Strategies
Published: 02/27/2023

Originally published by Titaniam. Companies today face more and more security risks. Ransomware is on the rise, and cybercriminals are beginning to breach critical infrastructure with new techniques. In an effort to reduce the frequency and severity of these attacks, the United States government ...

Five Easy Cybersecurity Predictions for 2023
Published: 02/16/2023

Originally published by TrueFort. Written by Nik Hewitt, TrueFort. It’s that time of year again when cybersecurity professionals consult our tea leaves and are obliged to play augury for the year to come. This year, however, it feels like the writing is already on the wall, and several glaring ar...

Social Engineering Tactics are Changing. Awareness Training Must Too.
Published: 01/19/2023

Originally published by CXO REvolutionaries. Written by Ben Corll, CISO - Americas, Zscaler. After hardening my corporate environment and improving our device management as CISO with previous organizations, I noticed that the would-be fraudsters quickly evolved their attack methods in response. I...

Verizon’s 2022 Mobile Security Index Report – Confirming What We All Suspected
Published: 09/14/2022

Originally published by Thales here. Written by Todd Moore, VP, Encryption Products, Thales.What happens when you combine a pandemic that forces most businesses into a remote work environment, coupled with increased mobile device use for many daily tasks? On the one hand, you get increased produc...

How to Protect Your Data When Ransomware Strikes
Published: 09/12/2022

Originally published by Lookout here. Written by Hank Schless, Senior Manager, Security Solutions, Lookout. Ransomware is not a new attack vector. In fact, the first malware of its kind appeared more than 30 years ago and was distributed via 5.25-inch floppy disks. To pay the ransom, the victim h...

Data Security Compliance in the Age of “Work from Anywhere, on Any Device”
Published: 08/29/2022

Originally published by Ericom here. Written by Peter Fell, Ericom. Customer protection and data security regulations vary significantly across industries and compliance requirements vary with them. Rigorously controlling sensitive data and safeguarding it against misuse, exposure and exfiltratio...

If a Recession Comes, Cut Cyber Professionals at Your Peril
Published: 08/10/2022

Originally published by CXO REvolutionaries here. Written by David Cagigal, CIO, State of Wisconsin (former).I was working for a utility company in 2008 when a bubble burst in the housing market and caused the economy to collapse. We were all asked to tighten our belts. I knew then that I had to ...

The State of Remote Work Offboarding Security
Published: 08/01/2022

Written by Marie Prokopets, Co-founder and COO, Nira. As companies switch to remote, distributed, and hybrid workforces, security risks related to offboarding have grown. When employees leave or change roles, organizations must protect their sensitive data from accidental or malicious data ex...

Gatekeepers to Gateopeners
Published: 07/07/2022

This blog was originally published by Laminar here. Written by Amit Shaked, Laminar. The past couple of years have been tragic and challenging as the world responded to COVID-19. One positive side effect of the pandemic however, has been the positive momentum of digital transformation, and the sh...

Achieving Zero Trust? One Size Does Not Fit All
Published: 06/20/2022

This blog was originally published by Lookout here.Written by Hank Schless, Senior Manager, Security Solutions, Lookout.How mobile and cloud technologies enable us to be reliableMore than a year of near-universal remote work has proven that many of us can reliably stay productive from anywhere — ...

Office Space: Cost Savings Hidden in Plain Sight
Published: 05/25/2022

This blog was originally published by CXO REvolutionaries here.Written by Craig Clay, Former Lead Connectivity Architect, Shell. Two recent megatrends have transformed our ideas about shared office space, likely forever. First, remote work has proven more effective than expected for many job role...

CISO to CISO: 3 Practical Tips to Protect Your Data in the Cloud
Published: 05/20/2022

Written by Marc Blackmer, ShardSecure. The explosion of remote work over the last two years has driven the rapid adoption of cloud services and, with that, a rise in threats and risk to enterprise data. Now that we know a hybrid work model is here to stay, organizations need to better understand ...

Focus on People, Process, and Technology to Secure Your Shadow IT
Published: 01/13/2022

Written by David Golding, AppOmni. Anyone in IT is familiar with shadow IT. How many times has an IT manager been surprised by the number of unknown applications that connect to their network? Shadow IT isn’t a new challenge, but the ability to keep track of unsanctioned IT has become more diffic...

Predictions 2022: Work-From-Anywhere Marks the Beginning of the End of On-Premises Security
Published: 01/04/2022

This blog was originally published by Lookout here. Written by Sundaram Lakshmanan, CTO of SASE Products, Lookout. A decade ago, many were reluctant to move to the cloud. Many felt like they would have to relinquish controls they had within their perimeters. That sentiment has since reversed, whe...

Achieving Zero Trust Remote Access with Privileged Access Management
Published: 11/19/2021

Written by Matt Miller, BeyondTrust. The radical shift to embrace largescale remote work—and even a work-from-anywhere mindset, the accelerated pace of digital transformation, the proliferation of ransomware, and massive breaches (i.e. SolarWinds Orion, Colonial Pipeline, etc.) together have kick...

Why Cloud-Ready, Centralized AppSec Must Underpin State Government Cloud Adoption
Published: 11/17/2021

This blog was originally published by Checkmarx here. Written by Rebecca Spiegel, Checkmarx. State and local governments are accelerating their use of the cloud as they focus on delivering more digital services with fewer resources and continue responding to pandemic pressures. In a recent Fe...

More on Targeted Attacks and How to Protect Against Them
Published: 11/05/2021

Written by Alex Vakulov. Small and big organizations often face targeted attacks. APT (Advanced Persistent Threat) groups improve the quality of their operations, causing more serious damage. Timely detection and response, training of personnel, and advanced training of information security depa...

Browse by Topic
Write for the CSA blog
Submit your blog proposal

Sign up to receive CSA's latest blogs

This list receives 1-2 emails a month.