Cloud 101
Circle
Events
Blog

Industry Insights

Read the latest cloud security news, trends, and thought leadership from subject matter experts.

Industry Insights
CSA Issues Top 20 Critical Controls for Cloud Enterprise Resource Planning Customers
Published: 06/10/2019

By Victor Chin, Research Analyst, Cloud Security AllianceCloud technologies are being increasingly adopted by organizations, regardless of their size, location or industry. And it’s no different when it comes to business-critical applications, typically known as enterprise resource planning (ERP)...

Cloud Migration Strategies and Their Impact on Security and Governance
Published: 06/29/2018

By Peter HJ van Eijk, Head Coach and Cloud Architect, ClubCloudComputing.comPublic cloud migrations come in different shapes and sizes, but I see three major approaches. Each of these has very different technical and governance implications.Three approaches to cloud migrationCompanies dying to ge...

Five Cloud Migration Mistakes That Will Sink a Business
Published: 06/05/2018

By Jon-Michael C. Brook, Principal, Guide Holdings, LLCToday, with the growing popularity of cloud computing, there exists a wealth of resources for companies that are considering—or are in the process of—migrating their data to the cloud. From checklists to best practices, the Internet teems wit...

The Definition of Cloud Computing
Published: 10/26/2015

By Ross Spelman, Group Technical Services Manager, EspionWhat is the cloud and why should I go there?The transition to cloud services offers major opportunities for your organisation. Significant scalability, flexibility and cost-efficiency can all be achieved through the adoption of cloud-based ...

Top 3 Reasons Enterprises Hesitate to Adopt the Cloud
Published: 04/02/2015

By Stephanie Bailey, Senior Director/Product Marketing, PerspecsysDespite the clear benefits of the cloud, many enterprises still hesitate to fully adopt or capitalize on all the advantages. There are a few key reasons for hesitation, including the prevalence of data breaches and hacks in recent ...

Application-Aware Firewalls
Published: 08/09/2012

You may have heard the term "application-aware firewalls" recently and wondered what it meant. When it comes to security, everyone thinks of Firewalls, Proxies, IPS, IDS, Honeypots, VPN devices, email security and even Web security, but most people don’t think in terms of application level securi...

Test Accounts: Another Compliance Risk
Published: 10/07/2011

By: Merritt MaximiA major benefit associated with deploying identity management and/or identity governance into an organization is that these solutions provide the ability to detect and remove orphan accounts. Orphan accounts refer to active accounts belonging to a user who is no longer involved...

Securing Your File Transfer in the Cloud
Published: 09/30/2011

By Stuart Lisk, Sr. Product Manager, Hubspan Inc. File transfer has been around since the beginning of time. Ok, well maybe that is an exaggeration, but the point is, file transfer was one of the earliest uses of “network” computing dating back to the early 1970’s when IBM introduced the floppy d...

Browse by Topic
Write for the CSA blog
Submit your blog proposal

Sign up to receive CSA's latest blogs

This list receives 1-2 emails a month.