Cloud 101
Circle
Events
Blog

Industry Insights

Read the latest cloud security news, trends, and thought leadership from subject matter experts.

Industry Insights
How SSO and SaaS Make Spear-phishing Attacks More Dangerous
Published: 01/05/2022

Written by Varonis If you watch in real-time the actual tools that hackers use to compromise services and leverage that access to devastating purpose much of the theoretical questions of “Could we really get hit by an attack?” and “How bad could it really be?” fly out the window. Reality hits par...

Data Security is Physical Security
Published: 12/21/2021

This blog was originally published by Authomize here. Written by Gabriel Avner, Authomize. Online streaming platform Twitch was hacked last week and the memes were fantastic.In case you missed it, a hacker reportedly stole 125 GB of valuable data from the Amazon-owned streaming service. The stole...

HTML Smuggling Evades Traditional Cybersecurity Solutions
Published: 12/13/2021

This blog was originally published by ZTEdge here. Written by Nick Kael, Chief Technology Officer, ZTEdge. Microsoft’s 365 Defender Threat Intelligence Team recently issued a warning about a worrying increase in HTML smuggling attacks, in which hackers “smuggle” encoded malicious script via ema...

DNS-Layer Security: The Ultimate Guide to What It Is and Why You Need It
Published: 12/09/2021

Originally Published by Cisco on March 10, 2020. Written by Lorraine Bellon, Cisco. If you’re like most people, you probably don’t pay much attention to the domain name system (DNS) or worry about investing in cloud-based DNS-layer security. After all, the hallmark of well-functioning DNS servers...

Does Your Supply Chain Have a Nasty Surprise for You?
Published: 12/07/2021

This blog was originally published by Avanade here. Written by Rajiv Sagar, Avanade. Only 14% of Japanese business and IT executives know how well their partners and suppliers are enhancing their own cybersecurity—and that’s less than half the global average of 29%, according to research from Acc...

Instant Messaging Could Take Down Your Network
Published: 12/03/2021

This blog was originally published by Ericom here. By Mendy Newman, Ericom. Individuals who value both convenience and privacy – which means almost all users – depend on instant messaging (IM) apps to communicate across all aspects of their personal lives. Every time we open a new chat, Whats...

How to Better Protect Cloud Workloads and Your Crown Jewels
Published: 12/02/2021

This blog was originally published by Virsec here. Written by Matt Ambroziak, Virsec. Previously, I discussed how the attack surface is expanding in the cloud and the cloud-native security tools and best practices available to help mitigate risk. Now, let’s dig a little deeper into how attack...

What is Ransomware?
Published: 11/28/2021
Author: Dr. Jim Angle

Contributions by Michael Roza and Vince Campitelli Ransomware is a rapidly growing problem that has increased 715% year-over-year, according to the latest Threat Landscape Report 2020 by Bitdefender (Bitfinder, 2020). Ransomware is highly profitable, which has made it the fastest growing malware...

More on Targeted Attacks and How to Protect Against Them
Published: 11/05/2021

Written by Alex Vakulov. Small and big organizations often face targeted attacks. APT (Advanced Persistent Threat) groups improve the quality of their operations, causing more serious damage. Timely detection and response, training of personnel, and advanced training of information security depa...

Modern Cybersecurity: Book Preface
Published: 11/04/2021
Author: Erkang Zheng

On October 19, 2021, JupiterOne published a book, "Modern Cybersecurity: Tales from the Near-Distant Future". This is an excerpt from the Preface. PrefaceCybersecurity is transforming. The last decade of cyberattacks, threat actors, and an endless stream of breached data was just a catnap compare...

4 Misconceptions About DDoS Mitigation
Published: 11/02/2021

This blog was originally published by MazeBolt here. Written by Yotam Alon, MazeBolt. After several years in cybersecurity and specifically in the DDoS mitigation space, I often come across certain common and widespread misconceptions. Here are my top four: Misconception #1: "DDoS attacks are ...

Why Cloud Security is Critical for Retailers
Published: 10/29/2021

By Kristen Bickerstaff, CyberArk. The past few years have seen accelerated digital transformations for the retail industry as online shopping and the demand for digital-first businesses have grown tremendously. Retailers are rapidly turning to the cloud and Infrastructure-as-a-Service (IaaS) to...

Inside the Mind of a Cybercriminal: Common Hacking Methods, Explained
Published: 10/27/2021

This blog was originally published by Black Kite here. Cyber attacks are flooding today’s headlines. Not only are they growing in frequency, but the cost of a data breach in 2021 is more than $4 million per incident— a 10% increase over last year alone. Now all organizations are being called upon...

Learn How Ransomware Attacks Have Changed - And How Response Needs To, Too
Published: 10/22/2021

This blog was originally published by Mitiga here. Written by Ariel Parnes, Mitiga. Ransomware keeps hitting the news these days, filling headlines with stories about organizations struggling with disabled IT systems, inaccessible patient data, unavailable Wi-Fi, and general confusion. Ransomware...

Runtime Protection, the Mindset Shift Cloud Security Needs
Published: 10/21/2021

This blog was originally published by Virsec here. Written by Satya Gupta, Co-Founder and CTO, Virsec. For years, companies have adopted cloud infrastructure for ease and speed in deploying applications. However, over the past 18 months the move to the cloud has accelerated dramatically as em...

Top Network Security Mistakes in AWS, and How to Fix Them
Published: 10/18/2021

This blog was originally published by Valtix here. Written by Jigar Shah, Valtix. A Two-part Blog Series and Cloud Security Alliance Webinar In talking with end-user organizations, we’ve seen and heard lots of misconceptions and mistakes over the years – and even espoused a few ourselves. As H...

How to Protect Your Cloud Environment from Supply Chain Attacks
Published: 10/14/2021

This blog was originally published by Wiz here. Written by Josh Dreyfuss, Wiz. Recently, the Wiz research team hosted a webinar titled “How to Protect Your Cloud Environment from Supply Chain Attacks.” In this post, we’ll share a recap of what the team covered. To start with, just a quick look at...

Why Phishing is a Bigger Threat than Ransomware
Published: 10/08/2021

This blog was originally published by Bitglass here. Written by Jonathan Andresen, Bitglass. While enterprise security teams have had their hands full battling an increasing number of more sophisticated ransomware attacks, phishing attacks are on the rise with the easing of pandemic-related restr...

Top Vulnerability Assessment and Management Best Practices
Published: 10/05/2021

This blog was originally published by Sysdig here. Written by Víctor Jiménez Cerrada, Sysdig. Vulnerability assessment and vulnerability management practices are critical to minimizing the exposure and attack surface of your whole infrastructure. We’re human, and many things we build aren't pe...

When Leadership Ignores DDoS Risk - 3 Tips for CISOs
Published: 09/24/2021

This blog was originally published by MazeBolt here. Written by Yotam Alon, MazeBolt. A global telecom company suffered substantial damage from a DDoS attack, surprising its board and C-suite leaders, who had believed that they were well protected from DDoS attackers. The sudden attack br...

Browse by Topic
Write for the CSA blog
Submit your blog proposal

Sign up to receive CSA's latest blogs

This list receives 1-2 emails a month.