Cloud 101

Industry Insights

Read the latest cloud security news, trends, and thought leadership from subject matter experts.

Industry Insights
Healthcare Cybersecurity: 8 Data Protection Best Practices
Published: 01/07/2022

This blog was originally published by BigID here. Written by Kimberly Steele, BigID. Healthcare organizations need to look beyond compliance to reduce risk, implement robust data management, and achieve a data protection program that balances safeguarding patient data with providing the highest q...

The Three Pillars of a CARTA-enabled CSPM Strategy
Published: 12/28/2021

This blog was originally published by Secberus here. Written by Fausto Lendeborg, Secberus. The cloud has changed how enterprises operate today. It has allowed companies to more easily store and share data. And with all this new data, it's increasingly important to make sure your security strat...

What Did We Learn About Cyber Risk Management in 2021?
Published: 12/17/2021

By Bob Maley, Chief Security Officer at Black Kite “The more things change, the more they stay the same.” Author Jean-Baptiste Alphonse Karr wrote this in 1849 and it still rings true today, especially in cybersecurity. The number of reported data breaches in 2021 have soared past the total for 2...

What’s Your Risk Appetite?
Published: 12/04/2021
Author: Kurt Seifried

Let’s get some dinnerIn European history, the first restaurant was opened in Paris in 1765 with a single dish (sheep’s feet simmered in a white sauce). In eastern history, the first restaurants opened in around 1100 A.D. in China in a number of different cities. Either way, we can all agree that ...

Why Now is the Time for Chaos (Engineering)
Published: 11/30/2021

Written by Morey J. Haber, BeyondTrust. If you are old enough to remember the television show Get Smart, you may be familiar with the concept of applying chaos to provide order. While this spy show spoof mocked political stereotypes of the time for control versus chaos, the slapstick humor was de...

Better Together: CMDB + CSPM = Cloud Native Cyber Asset Management
Published: 11/24/2021

This blog was originally published by JupiterOne here. Written by Tyler Shields, JupiterOne. There is a lot of confusion out there when it comes to cloud native IT and cloud security tools. Things have gotten rather complicated over the last few years as we migrate our security and technology sta...

The Fourth Dimension of Security Risk Management
Published: 11/24/2021

This blog was originally published by Orca Security here. Written by Andy Ellis, Advisory CISO for Orca Security. When security professionals talk about risk, especially with business executives, we often use metaphors rooted in the physical world. We might talk about coverage, and compare it to ...

Multi-Cloud Security: What You Need to Know
Published: 11/16/2021

This blog was originally published by Vulcan Cyber here. Written by Orani Amroussi, Vulcan Cyber. The multi-cloud approach is becoming increasingly popular among companies looking to take advantage of its agility, innovation, potential cost savings, and the flexibility to choose the best of what ...

Why Your Organization Needs Cyber Insurance
Published: 11/05/2021

This blog was originally published by SafeBase here. Written by Kevin Qiu, Director of Information Security at SafeBase. Security Incidents Are Becoming Increasingly Expensive Cyber security products and defensive techniques have come a long way over the past few years as cloud computing has t...

Why the Facebook Outage and Twitch Breach Matter to Business Leaders
Published: 11/02/2021

By Josh Stella, Fugue Co-Founder and CEO Originally Published at Fugue on October 14, 2021 This month, Facebook and Twitch both suffered serious damage at their own hands, and every executive needs to understand what happened and how these types of incidents are preventable. At Fac...

Business Continuity and Disaster Recovery in the Cloud
Published: 10/31/2021
Author: Megan Theimer

Business Continuity and Disaster Recovery (BC/DR) is just as important for cloud computing as it is for any other technology. However, specific considerations for the cloud need to be kept in mind. This blog will provide an overview of how to approach BC/DR in the cloud, including the overarching...

Runtime Protection, the Mindset Shift Cloud Security Needs
Published: 10/21/2021

This blog was originally published by Virsec here. Written by Satya Gupta, Co-Founder and CTO, Virsec. For years, companies have adopted cloud infrastructure for ease and speed in deploying applications. However, over the past 18 months the move to the cloud has accelerated dramatically as em...

Agents are Not Enough: Why Cloud Security Needs Agentless Deep Scanning
Published: 10/20/2021

This blog was originally published by Wiz here. Written by Josh Dreyfuss, Wiz. Cloud environments are characterized by their dynamic nature. It’s easier than ever before to spin up new resources and add new technologies, which leads to an ever-increasing number of people and teams deploying in th...

Security as Code is the Future to Governing Risk
Published: 10/19/2021

This blog was originally published by Secberus here. Written by Fausto Lendeborg, Secberus. We read McKinsey’s Security as code: The best (and maybe only) path to securing cloud applications and systems in July and have not stopped discussing it. The big idea: “Managing security as code...

CISO DDoS Handbook - The DDoS Threat to Digital Transformation
Published: 10/18/2021

This blog was originally published by MazeBolt here. Written by Yotam Alon, MazeBolt. As the global economy and its reliance on technology continue to evolve, so do cyberattackers’ strategies and techniques - working on launching debilitating DDoS attacks with the intent to cause downtime a...

How to Protect Your Cloud Environment from Supply Chain Attacks
Published: 10/14/2021

This blog was originally published by Wiz here. Written by Josh Dreyfuss, Wiz. Recently, the Wiz research team hosted a webinar titled “How to Protect Your Cloud Environment from Supply Chain Attacks.” In this post, we’ll share a recap of what the team covered. To start with, just a quick look at...

Four Ways Automation Can Transform Your Third-Party Cyber Risk Management Strategy
Published: 10/07/2021

This blog was originally published by Black Kite here. Supply chains are growing at an annual rate of 11.2% and are forecasted to double in size by 2026. Growing supply chains inherently pose greater supply chain risk and require a scalable approach to vendor risk management. Cyber risk monitorin...

7 Ways to Harden Your Environment Against Compromise
Published: 09/29/2021

This blog was originally published by Microsoft here. Written by Alan Johnstone, CRSP Senior Consultant and Patrick Strijkers, CRSP Cyber Security Architect, Microsoft. Here at the global Microsoft Compromise Recovery Security Practice (CRSP), we work with customers who have experienced disrupt...

5 Areas Exposing Your AWS Deployments to Security Threats
Published: 09/27/2021

This blog was originally published on Let’s be honest, the cloud has come at us fast this past year—especially if you’re a security practitioner. Like lining up to race Usain Bolt in the 100 meters kind of fast. Only he’s the cloud and you’re trying to keep up. As soon as you get se...

Reduce Your Risk: Supply Chain Attacks and the Rise of Ransomware
Published: 09/16/2021

This blog was originally published by OneTrust here.Organizations are at risk of an attack on one of their vendors that may impact their day-to-day operations. Citing a recent major breach in the information technology industry as an example, it’s clear that by using ransomware hackers, malicious...

Browse by Topic
Write for the CSA blog
Submit your blog proposal

Sign up to receive CSA's latest blogs

This list receives 1-2 emails a month.