Industry Insights

Read the latest cloud security news, trends, and thought leadership from subject matter experts.

Industry Insights
Zero Trust Adoption Report: How Does Your Organization Compare?
Published: 09/23/2021

This blog was originally published by Microsoft here.Written by Vasu Jakkal; Corporate Vice President, Security, Compliance and Identity; Microsoft.From the wide adoption of cloud-based services to the proliferation of mobile devices. From the emergence of advanced new cyberthreats to the recent ...

MPA Best Practice Guidelines Name RBI as Implementation Guidance Infrastructure for Web Filtering and Usage Control
Published: 08/27/2021

This blog was originally published by Ericom Software here.Written by Peter Fell, Group CTO, EME, Ericom Software. What Every TPN Vendor Should Know About Remote Browser Isolation In a recent important addition to the Motion Picture Association (MPA) Content Security Program, MPA Best Practic...

The Future of Work is Hybrid – Is Your Security Ready?
Published: 08/25/2021

This blog was originally published by Bitglass here.Written by Jonathan Andresen, Bitglass.It wasn’t that long ago that most of us used to work in an office. Fifteen months into the global COVID pandemic it’s now certain that the future will not be a full return to the office or a continuation of...

Understanding Cloud Drift Enables Zero Trust Cloud Management
Published: 08/09/2021

This blog was originally published by OpsCompass here.Written by John Grange, OpsCompass.True Insight into Your Security Posture and Drift is Key to Zero-TrustIn the cloud everything is configurable software. This sounds a little obvious, if not trite, but it actually represents an important insi...

Three Network Weaknesses that Zero Trust Addresses
Published: 08/04/2021

Zero Trust is a network security concept that aims to protect enterprise assets. Under Zero Trust, organizations should not automatically trust anything inside or outside traditional perimeters. Before granting access to assets, organizations should require the verification of anything and everyt...

Can Web Browsers be “Secure” as Required by Federal Cybersecurity Guidelines?
Published: 07/28/2021

This blog was originally published by Ericom Software here.Written by Gerry Grealish, Ericom Software Chief Marketing Officer.The National Institute of Standards and Technology (NIST) issued its “Definition of Critical Software Under Executive Order,” one of the first items to be delivered in res...

Six Key Characteristics of a Modern ZTNA Solution
Published: 07/20/2021

This blog was originally published by Bitglass hereWritten by Jeff Birnbaum, BitglassEven as organizations continue adoption of cloud technologies, the need for secure access to on-premises resources has not gone away. In fact, as many companies navigate a return to the office while simultaneousl...

Machine Learning in Identity and Access Management
Published: 07/14/2021

This blog was originally published by ZTEdge hereWritten by Leo Versola, ZTEdge In recent years, artificial intelligence and machine learning have been quietly transforming industries from agriculture and education to healthcare, marketing, and customer service. In 2018 over 60,000 US patent app...

Will New Executive Order on Cybersecurity Fast Track Zero Trust?
Published: 07/13/2021

This blog was originally published by Bitglass hereWritten by Jonathan Andresen, BitglassOn May 12, US President Biden issued a landmark executive order on Improving the Nation’s Cybersecurity that signals the need for governments and enterprises alike to boost their cyber defenses around the pri...

Food Industry Increasingly Targeted by Cybercriminals
Published: 07/02/2021

This blog was originally published by Ericom Software hereBy Simon Moran, VP Business Development, Ericom Software In recent weeks, cybercriminals seem to be working their way down a checklist of the basic necessities of a modern life: Healthcare – check, Scripps, HSE and a bunch more. Energy – ...

Cybercriminals Ramp Up Attacks on Healthcare, Again
Published: 06/24/2021

This blog was originally published by Ericom here Written by James Lui, Ericom Sometimes, even knowing what’s coming can’t help you stop it. Cybersecurity experts anticipated an increase in cyberattacks on healthcare organizations during 2021. And sure enough, by the end of April, 30 US hospita...

Better Together: The Future of CASBs and SWGs
Published: 06/21/2021

This blog was originally published by Bitglass hereWritten by Jacob Serpa, BitglassWe’ve established before that cloud access security brokers (CASBs) and secure web gateways (SWGs) do not compete and are, in fact, complementary security tools. However, in addition to this, there is overlap betwe...

​Securing a new world of hybrid work: What to know and what to do
Published: 06/16/2021

This blog was originally published by Microsoft Security here Written by Vasu Jakkal, Corporate Vice President, Security, Compliance and Identity, Microsoft The cybersecurity landscape has fundamentally changed, as evidenced by large-scale, complex attacks like Nobelium, Hafnium, and more rec...

How SDP Can Be Used to Thwart DDoS Attacks
Published: 03/26/2021

By Shamun Mahmud, Senior Research Analyst and Standards Officer for the Cloud Security AllianceSoftware Defined Perimeter provides an integrated security architecture that is otherwise hard to achieve with existing security point products. We’ve seen tremendous growth in interest, enterprise adop...

How to choose a Zero Trust architecture: SDP or Reverse-Proxy?
Published: 02/15/2021

This blog was originally published on Wandera.comWritten by Alex Wells at WanderaZero Trust Network Access (ZTNA) is the next generation access solution that is set to be a key part of IT administrators toolkits, displacing longstanding Virtual Private Networks (VPN). There are numerous factors a...

​Earning Trust in the 21st Century - Creating Trust Frameworks in a Zero Trust World
Published: 01/26/2021

By: Anil Karmel, President, Cloud Security Alliance Washington DC Metro Area Chapter (CSA-DC)Our world is more connected and reliant on technology than ever before, yet we are more disconnected and trust each other less now than ever before. New attacks such as the SolarWinds hack have immense re...

Help CSA Develop a New SDP Training - Join the SDP Expert Group
Published: 01/24/2021

Join the Software Defined Perimeter Expert GroupCSA is looking for volunteers to join the CSA Software Defined Perimeter (SDP) Expert Group to help review and advise on the scope, curriculum, objectives, structure, go-to-market strategy and value proposition for an 8 hour CSA SDP Training.This gr...

Browse by Topic
Write for the CSA blog
Submit your blog proposal