Circle
Events
Blog

Industry Insights

Read the latest cloud security news, trends, and thought leadership from subject matter experts.

Industry Insights
Securing Your Cloud Transformation Journey with Smart Cybersecurity Investments
Published: 06/27/2022

Written by Syam Thommandru, VP, Global Alliances and Product Management, Cybersecurity & GRC Services, HCL Technologies and Vinay Anand, VP, Prisma Cloud, Palo Alto Networks. There is no denying that cloud is the new norm. As a critical enabler of business during the pandemic, more businesses hav...

Why You Need Application Security Testing for Business-Critical Applications: Part 2
Published: 06/10/2022

This blog was originally published by Onapsis here.In this blog series, we discuss the importance of building secure business-critical applications with application security testing. In part one, we shared that while speed is the driving force behind application development, on-time application d...

Critical AppSec Capabilities That Accelerate Cloud Transformation
Published: 06/06/2022

Written by Sujatha Yakasiri, CSA Bangalore Chapter and Stan Wisseman, CyberRes Cloud Technology is one of the fastest-growing technologies across the globe these days. Cloud adoption by organizations has increased exponentially especially during the covid-19 outbreak due to remote working culture...

Moving Beyond Best-of-Breed Into a Cloud-First World
Published: 06/06/2022

This blog was originally published by CXO REvolutionaries here. Written by Brett James, Director, Transformation Strategy, Zscaler. Typical IT infrastructure in days gone by consisted of racks upon racks of best-of-breed equipment filling niche applications. Shiny boxes from a variety of vendors ...

Cloud Security Terms You Need to Know
Published: 06/04/2022

As more companies are migrating to the cloud, security must remain at the forefront of everyone’s minds. Regardless of your job title, industry, or technical knowledge, the topic of cloud security is necessary. Explore the following terms to stay up-to-date with and gain a baseline knowledge of t...

How to Protect Against Phishing
Published: 05/31/2022

This blog was originally published by Agio here. Phishing is one of the most common cybersecurity schemes, and it happens all over the world every day. Anyone can become a victim of phishing in seconds. Learn how to protect yourself by understanding the signs of a phishing attempt and the steps y...

101 Guide on Cloud Security Architecture for Enterprises
Published: 05/14/2022

Based on the CSA Enterprise Architecture Reference Guide and the CSA Security Guidance v4.Cloud security is cybersecurity. As cloud adoption grows, it has also become the basis for new ways of organizing compute, such as containerization and DevOps, which are inseparable from the cloud.In this bl...

As You Move to the Cloud, Make Sure Your PKI Goes with You
Published: 04/26/2022

This blog was originally published by Entrust here. Written by Samantha Mabey, Product Marketing Management Director, Certificate Solutions at Entrust. I’m sure most of us have heard the buzz around “multi-cloud” or “hybrid cloud.” But what exactly does it mean? And more importantly, what does it...

Cloud Security Best Practices from the Cloud Security Alliance
Published: 04/23/2022

Cloud is becoming the back end for all forms of computing and is the foundation for the information security industry. It’s a model for enabling convenient and on-demand network access to a shared pool of computing resources that can be rapidly provisioned and released with minimal management eff...

Network Intelligence: Required Information and Insights in This Digital Era
Published: 04/18/2022

This blog was originally published by Gigamon here. Written by Mark Leary, IDC Research Director, Network Analytics and Automation. For more, read Part 1 of this series.In my previous guest blog, “Your Network and Their Cloud: Less Visibility. More Vulnerabilities,” I focused on the rising challe...

Why You Need Application Security Testing for Business-Critical Applications
Published: 04/14/2022

This blog was originally published by Onapsis here. This blog is about the importance of building secure business-critical applications with application security testing. While many organizations employ defense-in-depth security models to protect their critical systems, not enough consideration i...

6 Questions to Ask Along Your Journey to the Cloud
Published: 04/11/2022

Written by Robert Clyde, ShardSecure A few years ago, a question many enterprises wrestled with was whether migrating to the cloud was a worthwhile endeavor. While there are still some server-huggers, enterprises have resoundingly answered ”yes” to that question and moved beyond that basic ques...

Cloud and Sovereignty: Are They Compatible?
Published: 03/24/2022

This blog was originally published by Atos here. Written by Frederic Malicki, Pierre Brun-Murol, and Dominique Michiels. In a period where moving to cloud and sovereignty are becoming central for many companies and institutions — especially in Europe — let’s take a moment to examine the apparent ...

What Are Cloud Controls?
Published: 03/19/2022

There are many risks associated with cloud computing. Therefore, it’s critical to understand cloud security before attempting to migrate your organization to the cloud.Cloud controls are safeguards or countermeasures that help organizations manage risk in the cloud. Cloud controls can be policies...

Looking for an Entry-Level Cloud Security Certificate? Earn the CCSK
Published: 03/12/2022

Regardless of where you are on your cloud journey, the Certificate of Cloud Security Knowledge (CCSK) can help you get there. This certificate is not just for technical professionals, and even the study materials alone prove to be helpful to non-technical and entry-level staff trying to gain a ba...

Leapfrog Your Cloud Migration – Don’t Let a Skills Shortage Stifle Business Possibilities
Published: 03/10/2022

This blog was originally published by Entrust here. Written by Juan Asenjo, PH.D., CISSP, Director of Product, Solutions and Partner Marketing at Entrust. Most of you will be familiar with the term leapfrog. Stemming from a children’s game, it’s an expression used not only in English, but also ...

Your Network and Their Cloud: Less Visibility. More Vulnerabilities.
Published: 03/08/2022

This blog was originally published by Gigamon here. Written by Mark Leary, IDC Research Director, Network Analytics and Automation. Cloud services form a core component of a resilient digital infrastructure. Cloud-first has developed into a primary infrastructure and application strategy for a go...

The CFO and Cloud Adoption: 102
Published: 01/14/2022
Author: Jeffrey Westcott, CPA

In my last post, I discussed the NIST definition of the cloud. Let’s take this to the next level by discussing the different service models offered by cloud service providers (CSPs). Three basic delivery models – SaaS, PaaS and IaaS – are listed below. These are the basic and oft-referenced model...

Transitioning to the Cloud in 2022: Recommended Resources from CSA
Published: 01/11/2022

How can your organization improve how it approaches the cloud? In this blog we put together a list of research created by the Cloud Security Alliance’s working groups and other resources created by our community that will be helpful to you if you are considering transitioning your organization to...

Cloud Cost Optimization: A Pivotal Part of Cloud Strategy
Published: 12/23/2021

Written by Gaurav Aggarwal, Avanade. This article was originally published on Forbes. It has also been previously published by Avanade. Cloud has undoubtedly been one of the clear winners in the Covid-19-induced digital transformation journey for most companies. However, managing costs is one of ...

Browse by Topic
Write for the CSA blog
Submit your blog proposal

Sign up to receive CSA's latest blogs

This list receives 1-2 emails a month.