Cloud 101
Circle
Events
Blog

Industry Insights

Read the latest cloud security news, trends, and thought leadership from subject matter experts.

Industry Insights
An Interview with One of the Developers of CSA’s Zero Trust Training
Published: 11/22/2022
Author: Megan Theimer

These days, Zero Trust is a term that you can’t seem to get away from - and you shouldn’t want to! Zero Trust is based on the principle that no part of a computing and networking system can be implicitly trusted, including the humans operating it. This concept codifies an evolutionary approach to...

Web 3.0 Security Issues: What Your Company Needs to Know for 2023
Published: 11/22/2022

Originally published by TokenEx. Written by Anni Burchfiel, TokenEx. The world wide web had its first major shift when blogging and forum capabilities were added to web alongside the established collection of static company websites. The ability for anyone to add their own content to the web, tho...

Inoculate Your Company Against Security Data Gaps to Develop Cyber Immunity
Published: 11/21/2022

Written by Arti Raman, CEO and Founder, Titaniam. Protecting sensitive customer data, or personally identifiable information (PII), is a high priority for companies in verticals ranging from financial services to healthcare and retail. Chief information security officers (CISOs) for these ind...

Anatomy of a Cyber Attack (and What You Can Do About It)
Published: 11/18/2022

Originally published by TrueFort. Written by Matt Hathaway, TrueFort. Security criminals know how IT and security operations work in organizations. They know and exploit common weaknesses. To effectively protect against them, security teams need to turn the tables and get inside the attackers’ br...

Modernize Your Security Architecture with SASE
Published: 11/17/2022

Written by S Sreekumar, VP and Global Practice Head, Infra & Cloud Security, Cybersecurity & GRC Services, HCLTech and Nicole Scheffler, Director of SASE Solutions, Palo Alto Networks. Hybrid and remote working are now the norm, making it critical for organizations to provide secure access to...

Zscaler Debuts Zero Trust Certified Architect (ZTCA) Program to Address IT and SecOps Skills Gap
Published: 11/15/2022

Originally published by Zscaler. Written by Jay Chaudhry, CEO and Founder, Zscaler. An increase in large-scale cyber attacks has driven widespread interest for organizations to migrate to a Zero Trust architecture. A Zero Trust architecture is a new, clean architectural paradigm - one that is bui...

Security Scope and the Threat Continuum. What CISOs Need to Know.
Published: 11/14/2022

Originally published by Netography. Written by Martin Roesch, Netography. The pandemic kicked off a rapid evolution of networks that have now become composites of multi-cloud, hybrid-cloud, and on-prem infrastructure with mobile and remote workers accessing data and applications scattered across ...

Don’t Leave it to Your Apps: Why Security Needs to be a Shared Responsibility
Published: 11/07/2022

Originally published by Lookout. Written by Hank Schless, Senior Manager, Security Solutions, Lookout. Here’s a scenario that was unlikely just two years ago: permanently telecommuting from Honolulu to your financial job on Wall Street. Fast forward to today, the world has accepted that productiv...

How to Combat Insider Threats to Critical Data
Published: 11/03/2022

Originally published by TrueFort. Written by Matt Hathaway, TrueFort. Malicious cyber attackers have had unprecedented success in the past few years, but their attacks often rely on tricking or exploiting people inside an organization. Employees, software developers, partners, and even executives...

How to Contain Breaches in the Cloud
Published: 11/02/2022

Written by PJ Kirner, CTO and Co-Founder, Illumio. Hyperconnectivity, hybrid work and an increasingly distributed enterprise have all caused the modern attack surface to explode. In the past 2 years alone, 76 percent of organizations have been attacked by ransomware and 66 percent have experien...

What Lawyers Need to Do to Defend Their Clients and Themselves from Cyber Risk
Published: 11/02/2022

Originally published by Ericom. Written by Nick Kael, CTO, Ericom. Absolute trust is the essential basis of the relationship between law firms and their clients. Lawyers steer clients through complex and often sensitive personal and business situations, helping them navigate difficult issues to g...

How John Kindervag’s Zero-Trust Model Applies to Cloud Security
Published: 10/31/2022

Originally published by Britive.At its core, the Zero-Trust Model is wonderfully simple: when you remove trust, you reduce security risk. The concept was developed by John Kindervag, who now serves as a Senior Vice President for ON2IT Cybersecurity. Kindervag realized enterprises could gain bette...

All Eyes on Cloud | Why the Cloud Surface Attracts Attacks
Published: 10/28/2022

Originally published by SentinelOne here. Cloud environments have seen a meteoric rise in the past decade. What began as means of data storage has now become a full-scale computing platform, enabling a global shift in how businesses share, store, optimize, and manage information. However, threat ...

SaaS Security Use Case Series: Device-to-SaaS User Risk
Published: 10/26/2022

Originally published by Adaptive Shield here. Written by Eliana Vuijsje, Marketing Director, Adaptive Shield. Typically, when threat actors look to infiltrate an organization’s SaaS apps, they look to SaaS app misconfigurations as a means for entry. However, employees now use their personal devic...

What Any Executive Needs to Know About Zero Trust
Published: 10/21/2022
Author: Daniele Catteddu

Why should a company executive be interested in Zero Trust? Isn’t that supposed to be obvious? Apparently, it’s not; otherwise, we wouldn’t have nearly 1 billion successful ransomware attacks between January 2021 and June 2022.Whether we like it or not, lately, Zero Trust is becoming synonymous w...

The String (Cheese) Theory of Zero Trust
Published: 10/19/2022

Originally published by CXO REvolutionaries here. Written by Martyn Ditchburn, Director of Transformation Strategy, Zscaler. I regularly get asked, “How did you drive the change from the traditional data center and legacy architecture to a new paradigm of 100% cloud, DevNetSecOps, and zero trust ...

Transform Your Cybersecurity Landscape with Governance-Driven Cloud Security
Published: 10/19/2022

Written by Sanjay Karandikar, Global Practice Head, Identity & Access Management, Cybersecurity & GRC Services, HCLTech. Cloud adoption cannot wait. Gartner analysts say that from 30% in 2021, over 95% of new digital workloads will be hosted on cloud-native platforms by 2025. It reaps significant...

7 Best Practices for Cloud Incident Response
Published: 10/18/2022

Originally published by Mitiga here. Written by Matthew Stephen, Mitiga. You may have heard the saying that it is not a matter of “if” but “when” you will experience a breach. An attack could be targeted or opportunistic, performed by a nation-state or a less sophisticated threat actor, focused o...

Why Gaming Companies Should Follow the MPA’s Lead
Published: 10/18/2022

Originally published by Ericom here. Written by Tova Osofsky, Ericom. Grand Theft Auto 6 Leaks Hit Rockstar Hard In the wake of what they characterized as a “network intrusion in which an unauthorized third party illegally accessed and downloaded… early development footage for the next Gran...

Grand Theft Hacker: A Look at The Rockstar Games and Uber Hack
Published: 10/10/2022

Originally published by Skyhigh Security here. Written by Arnie Lopez, WW Systems Engineering, Skyhigh Security. What does one of the most successful ride-sharing platforms and one of the world’s most popular video games share in common?If you said, “Cars,” you would be right.If you said, “Both w...

Browse by Topic
Write for the CSA blog
Submit your blog proposal

Sign up to receive CSA's latest blogs

This list receives 1-2 emails a month.