Industry Insights

Read the latest cloud security news, trends, and thought leadership from subject matter experts.

Industry Insights
Runtime Protection, the Mindset Shift Cloud Security Needs
Published: 10/21/2021

This blog was originally published by Virsec here. Written by Satya Gupta, Co-Founder and CTO, Virsec. For years, companies have adopted cloud infrastructure for ease and speed in deploying applications. However, over the past 18 months the move to the cloud has accelerated dramatically as em...

Agents are Not Enough: Why Cloud Security Needs Agentless Deep Scanning
Published: 10/20/2021

This blog was originally published by Wiz here.Written by Josh Dreyfuss, Wiz.Cloud environments are characterized by their dynamic nature. It’s easier than ever before to spin up new resources and add new technologies, which leads to an ever-increasing number of people and teams deploying in the ...

CISO DDoS Handbook - The DDoS Threat to Digital Transformation
Published: 10/18/2021

This blog was originally published by MazeBolt here. Written by Yotam Alon, MazeBolt. As the global economy and its reliance on technology continue to evolve, so do cyberattackers’ strategies and techniques - working on launching debilitating DDoS attacks with the intent to cause downtime a...

How to Protect Your Cloud Environment from Supply Chain Attacks
Published: 10/14/2021

This blog was originally published by Wiz here.Written by Josh Dreyfuss, Wiz.Recently, the Wiz research team hosted a webinar titled “How to Protect Your Cloud Environment from Supply Chain Attacks.” In this post, we’ll share a recap of what the team covered.To start with, just a quick look at su...

Four Ways Automation Can Transform Your Third-Party Cyber Risk Management Strategy
Published: 10/07/2021

This blog was originally published by Black Kite here. Supply chains are growing at an annual rate of 11.2% and are forecasted to double in size by 2026. Growing supply chains inherently pose greater supply chain risk and require a scalable approach to vendor risk management. Cyber risk monitorin...

7 Ways to Harden Your Environment Against Compromise
Published: 09/29/2021

This blog was originally published by Microsoft here. Written by Alan Johnstone, CRSP Senior Consultant and Patrick Strijkers, CRSP Cyber Security Architect, Microsoft. Here at the global Microsoft Compromise Recovery Security Practice (CRSP), we work with customers who have experienced disrupt...

5 Areas Exposing Your AWS Deployments to Security Threats
Published: 09/27/2021

This blog was originally published on Vectra.ai Let’s be honest, the cloud has come at us fast this past year—especially if you’re a security practitioner. Like lining up to race Usain Bolt in the 100 meters kind of fast. Only he’s the cloud and you’re trying to keep up. As soon as you get se...

Reduce Your Risk: Supply Chain Attacks and the Rise of Ransomware
Published: 09/16/2021

This blog was originally published by OneTrust here.Organizations are at risk of an attack on one of their vendors that may impact their day-to-day operations. Citing a recent major breach in the information technology industry as an example, it’s clear that by using ransomware hackers, malicious...

Scaling GRC Programs: 5 Ways Security Leaders Enable the Business
Published: 07/19/2021

This blog was originally published by OneTrust GRC here.The compliance landscape is in constant flux between external factors changing and businesses working toward scaling GRC programs. Managing compliance is difficult for organizations operating across multiple geographies with multiple sets of...

The Right Time to Hire a Product Security Analyst
Published: 06/30/2021

This blog was originally published by CyberCrypt here.A doll that understands what children say and responds to them seemed, in 2015, like a great idea — unless you were a security analyst.Unfortunately for Mattel, security analysts seem to have been left out of the conversation until the toymake...

Is the Cloud Control Plane a New Frontline in Cybersecurity?
Published: 06/29/2021

This blog was originally published on Vectra.ai As cloud adoption continues to accelerate with no end in sight, the evolution of the next generation of modern attacks will traverse through and towards an enterprise’s cloud control plane. But why is that? The control plane provides management...

​Continuous Security Control Enforcement & Governance in the Cloud Ecosystem
Published: 06/23/2021

Written by Raghvendra Singh, Head, Cloud Security CoE, Cyber Security Unit, TCS Digital transformation across industries has witnessed unprecedented acceleration in recent times. Cloud, with its greater flexibility, agility, resilience, and scalability, is invariably the cornerstone technology...

How to Enhance GRC Program Collaboration in Your Organization
Published: 06/10/2021

This blog was originally published by OneTrust GRC here. When it comes to Governance, Risk, and Compliance (GRC), understanding the integrated risk management responsibilities for each internal and external stakeholder isn’t just a best practice. It’s a critical component to preparing for and ...

Real-Time Security Metrics: Insights Every Risk Management Team Should Monitor
Published: 06/08/2021

This blog was originally published by OneTrust GRC here. There is one thing that businesses of all sizes, industries, and sectors have in common – they face a wide range of risk management threats. Specifically, retail, finance, hospitality, government, manufacturing, and healthcare industries...

How CSPs Can Make the Security and Compliance Evaluation Process Easier for Financial Institutions
Published: 06/02/2021

This blog was originally published by Oracle hereOracle author: Maywun Wong, Director, Product MarketingContributed by: Steven D'Alfonso, Research Director, IDC Financial InsightsSo, you have finally decided to move applications to the cloud. But your board's risk committee wants assurance that s...

With Great Power Comes Great Responsibility: The Challenge of Managing Healthcare Data in the Cloud
Published: 05/26/2021

By Jon Moore, MS, JD, HCISSP, Chief Risk Officer and Head of Consulting Services, Clearwater Seeking flexibility, scalability, and cost savings, an increasing number of healthcare organizations are moving systems and data to the Cloud. This trend is accelerating, fueled by increased adoption of ...

Incident Response and Knowing When to Automate
Published: 03/24/2021

This blog was originally published on Vectra.ai Measuring and improving total time of response is easier said than done. The reality is many organizations do not know their existing state of readiness to be able to respond to a cybersecurity incident in a fast, effective manner. And most don’t...

​The Age of Collaborative Security
Published: 03/09/2021

Written by: Philippe Humeau, CEO, CrowdSecThe Cloud Security Alliance was born from a need, the need to collaborate, whether we are partners or competitors, for the greater good of our industry and its customers. That’s what alliances are made for, to become stronger together.Security wise, few a...

Transforming Your IT Risk Management from Reactive to Proactive in 5 Steps
Published: 03/04/2021

This blog was originally published on Hyperproof's blog.Written by Jingcong Zhao, Director of Content Strategy at HyperproofAs a seasoned IT risk management professional, you already know that staying on top of security is a constant battle. You probably also know that managing IT risks proactive...

NACHA Updates | Supplementing Data Security Requirements
Published: 01/19/2021

Written by TokenExIn late 2019, NACHA supplemented its existing Security Framework for the ACH Network with a new rule applying to all merchants, billers, businesses, governments, and third parties that send 2 million or more ACH payments per year. The rule was expected to roll out in two phases,...

Browse by Topic
Write for the CSA blog
Submit your blog proposal