Industry Insights

Read the latest cloud security news, trends, and thought leadership from subject matter experts.

Industry Insights
CISO to CISO: 3 Practical Tips to Protect Your Data in the Cloud
Published: 05/20/2022

Written by Marc Blackmer, ShardSecure. The explosion of remote work over the last two years has driven the rapid adoption of cloud services and, with that, a rise in threats and risk to enterprise data. Now that we know a hybrid work model is here to stay, organizations need to better understand ...

Focus on People, Process, and Technology to Secure Your Shadow IT
Published: 01/13/2022

Written by David Golding, AppOmni. Anyone in IT is familiar with shadow IT. How many times has an IT manager been surprised by the number of unknown applications that connect to their network? Shadow IT isn’t a new challenge, but the ability to keep track of unsanctioned IT has become more diffic...

Predictions 2022: Work-From-Anywhere Marks the Beginning of the End of On-Premises Security
Published: 01/04/2022

This blog was originally published by Lookout here. Written by Sundaram Lakshmanan, CTO of SASE Products, Lookout. A decade ago, many were reluctant to move to the cloud. Many felt like they would have to relinquish controls they had within their perimeters. That sentiment has since reversed, whe...

Achieving Zero Trust Remote Access with Privileged Access Management
Published: 11/19/2021

Written by Matt Miller, BeyondTrust. The radical shift to embrace largescale remote work—and even a work-from-anywhere mindset, the accelerated pace of digital transformation, the proliferation of ransomware, and massive breaches (i.e. SolarWinds Orion, Colonial Pipeline, etc.) together have kick...

Why Cloud-Ready, Centralized AppSec Must Underpin State Government Cloud Adoption
Published: 11/17/2021

This blog was originally published by Checkmarx here. Written by Rebecca Spiegel, Checkmarx. State and local governments are accelerating their use of the cloud as they focus on delivering more digital services with fewer resources and continue responding to pandemic pressures. In a recent Fe...

More on Targeted Attacks and How to Protect Against Them
Published: 11/05/2021

Written by Alex Vakulov. Small and big organizations often face targeted attacks. APT (Advanced Persistent Threat) groups improve the quality of their operations, causing more serious damage. Timely detection and response, training of personnel, and advanced training of information security depa...

Why Choose an MSSP
Published: 11/04/2021

This blog was originally published by Cloudtango here. Written by Cloudtango. Since the pandemic, working from home has become widely adopted across all type of businesses around the globe. As the memory of the pandemic starts to progressively fade, many predict remote working will remain in one ...

Modern Cybersecurity: Book Preface
Published: 11/04/2021
Author: Erkang Zheng

On October 19, 2021, JupiterOne published a book, "Modern Cybersecurity: Tales from the Near-Distant Future". This is an excerpt from the Preface. PrefaceCybersecurity is transforming. The last decade of cyberattacks, threat actors, and an endless stream of breached data was just a catnap compare...

Are You Still Having Problems Building Secure Remote Access?
Published: 10/25/2021

Written by Alex Vakulov In this article, I want to talk about the practical issues of implementing secure remote access as well as what is happening in the market, how regulators affect teleworking, and whether it is necessary to monitor employees who work from home. In the spring of last year, ...

The Future of Work is Hybrid – Is Your Security Ready?
Published: 08/25/2021

This blog was originally published by Bitglass here.Written by Jonathan Andresen, Bitglass.It wasn’t that long ago that most of us used to work in an office. Fifteen months into the global COVID pandemic it’s now certain that the future will not be a full return to the office or a continuation of...

​Securing a new world of hybrid work: What to know and what to do
Published: 06/16/2021

This blog was originally published by Microsoft Security here Written by Vasu Jakkal, Corporate Vice President, Security, Compliance and Identity, Microsoft The cybersecurity landscape has fundamentally changed, as evidenced by large-scale, complex attacks like Nobelium, Hafnium, and more rec...

Six Key Characteristics of a Modern Secure Web Gateway
Published: 04/29/2021

This blog was originally published by Bitglass here.As we head into the second quarter of 2021 and mark a full year of remote work for many organizations, it is clear that the COVID-19 pandemic has accelerated digital transformation globally and changed the future of work — likely permanently. A ...

​2020 Hindsight and 2021 Foresight: Lessons Learned in the Work From Home Era
Published: 02/26/2021

By Lebin ChengOriginally posted by CloudVector It is hard to believe that it has already (or only?) been a year since a global pandemic forced organizations to adapt to the “new normal” of the work from home era. Given the 12-month milestone, now seems like the perfect time to stop and reflect on...

Remote working strategy: desktop virtualization or remote access?
Published: 02/22/2021

This blog was originally published on by Alex Wells from WanderaCreating a technology roadmap for your business can feel like an impossible task as there is always something new on the horizon that you need to account for. It doesn’t help that analysts are trying to predict th...

2020 Hindsight and 2021 Foresight – Lessons Learned and Predictions for the Velocity of Business
Published: 02/01/2021

By Ravi Balupari, Founder & CTO, CloudVector This blog originally was published by CloudVectorThey say that hindsight is 2020, which has certainly been the case this year. For most organizations, 2020 orchestrated a fundamental shift to the way we work. The paradigm shift to work from home has in...

Letting The Right One In: A Preamble to Device Trust
Published: 11/26/2020

Written by Dave Lewis, Advisory CISO — Global at Duo I’m sorry, do I know you? A typical query that people may ask when confronted by an unknown person who walks up abruptly and starts asking them questions. Oddly though, this sort of response does not happen in many network environments. When ...

3 Reasons Why You Need to Include a VRM Platform in 2021
Published: 11/23/2020

This blog was originally published by Whistic here. 2020 has been an incredibly long year for all of us. Honestly, we’re ready to start afresh in 2021. As the past months have brought on some unique challenges for InfoSec teams, they have also revealed areas of opportunity and growth regarding ho...

What is cloud security? How is it different from traditional on-premises network security?
Published: 11/09/2020
Author: Ryan Bergsma

Cloud is also becoming the back end for all forms of computing, including the ubiquitous Internet of Things and is the foundation for the information security industry. New ways of organizing compute, such as containerization and DevOps are inseparable from cloud and accelerating the digital revo...

The 10 Best Practices in Cloud Data Security
Published: 11/03/2020

By Branden Morrow from TokenExCloud Data Security Best Practices OverviewWhat exactly is cloud data security?Cloud security is the culmination of technologies and procedures that secure cloud computing environments against cybersecurity threats originating externally and internally. With cloud co...

Improving Data Security for SaaS Apps - 5 Key Questions every CISO needs to ask
Published: 10/06/2020

By Matt Hines, VP of Marketing at CipherCloud & Neeraj Nayak, Sr. Product Marketing Manager at CipherCloud Summary: The rapid uptake of game-changing SaaS applications has been transforming the way organizations do business long before COVD-19 emerged and the remote workforce exploded overnight...

Browse by Topic
Write for the CSA blog
Submit your blog proposal

Sign up to receive CSA's latest blogs

This list receives 1-2 emails a month.