Circle
Events
Blog

Industry Insights

Read the latest cloud security news, trends, and thought leadership from subject matter experts.

Industry Insights
SSE: The MVP of The Cybersecurity Mesh Architecture
Published: 05/12/2022

This blog was originally published by Axis Security here. Overtime IT has adopted a number of siloed security services. These services work adjacent to one another, rather than WITH one another. As you would’ve guessed, this increases complexity and decreases efficiency. This is why we must do aw...

What’s Zero Trust Data Access?
Published: 05/04/2022

This blogs was originally published by DoControl here. Written by Adam Gavish, DoControl. “Zero trust is a way of thinking, not a specific technology or architecture,” says Gartner Distinguished VP Analyst Neil MacDonald. “It’s really about zero implicit trust, as that’s what we want to get rid o...

Accelerating Transaction Success by Applying Zero Trust Principles to Mergers, Acquisitions, and Divestitures
Published: 05/03/2022

This blog was originally published by CXO REvolutionaries here. Written by Stephen Singh, Global Vice President, M&A/Divestiture and ITO Strategy, Planning, and Implementation, Zscaler. Mergers, acquisitions, and divestitures create value by seizing chances to drive growth, enhance margins, build...

Security Service Edge (SSE) is the Way to Go, But How Do You Choose?
Published: 05/02/2022

This blog was originally published by Lookout here. Written by Pravin Kothari, Executive Vice President, Product and Strategy, SASE, Lookout. Gartner® recently predicted that “By 2025, 80% of enterprises will have adopted a strategy to unify web, cloud services and private application access from...

Higher Ed Gets an 'F' for Ransomware Protection: How the Industry Must Evolve
Published: 04/25/2022

This blog was originally published by CXO REvolutionaries here. Written by Bryan Green, Chief Information Security Officer, Zscaler. Colleges and universities are amongst the slowest populations to modernize security controls, resulting in a high price tag – ransomware and breaches.It’s human nat...

Security Performance Reporting
Published: 04/20/2022

Command guidance for CISO-to-stakeholder communications Written by John Hellickson, Field CISO, Coalfire There is tremendous urgency for security professionals to do a better job at communicating security program performance to enterprise stakeholders and boards of directors. For the Coalfire ...

6 SDP Deployment Models to Achieve Zero Trust
Published: 04/16/2022

Written by the SDP and Zero Trust Working GroupWith Software Defined Perimeter (SDP), enterprises can move away from traditional (and largely ineffective) perimeter-centric models, achieving the goals of Zero Trust and therefore improving their security effectiveness and resiliency. SDPs replace ...

Cyber Readiness and the Russia-Ukraine War
Published: 04/12/2022

This blog was originally published on March 10, 2022 by Lookout. Written by Hank Schless, Senior Manager, Security Solutions, Lookout. I was encouraged when I saw our partners over at Microsoft step in when Russian cyberattacks commenced alongside their invasion of the Ukraine. While there ...

What NIST SP 800-207 Means for SaaS Security
Published: 04/08/2022

This blog was originally published by DoControl here. Written by Corey O'Connor, DoControl. The National Institute of Standards and Technology (NIST) and Cybersecurity and Infrastructure Security Agency (CISA) in August 2020 published NIST Special Publication 800-207. This special publication fol...

Leverage Zero Trust to Defend Against Geopolitical Uncertainty
Published: 04/07/2022

This blog was originally published by CXO REvolutionaries on March 24, 2022. Written by Brad Moldenhauer, CISO, Zscaler. As a major shift in the global geopolitical balance, Russia’s invasion of Ukraine has many dimensions, including militaristic, political, legal, cultural, and economic. We sho...

Zero Trust as a Framework for Fighting Back Against Cyberwarfare
Published: 04/01/2022

This blog was originally published by CXO REvolutionaries here. Written by Howard Sherrington, Director of Transformation Strategy, Zscaler. Russia's ongoing and unfortunate invasion of Ukraine has captured headlines for its cyber dimension as well as its physical one. The breadth of cyber operat...

Your Data Is Everywhere: Here Are The Critical Capabilities Of A Modern Data Loss Prevention (DLP)
Published: 03/21/2022

This blog was originally published by Lookout here. Written by Sundaram Lakshmanan, CTO of SASE Products, Lookout. In some ways, IT teams had a great life in the early 2000s. Data was stored inside data centers and accessed through known ingress and egress points like a castle with a limited numb...

Unlocking Competitive Advantage With a Zero Trust Multicloud Strategy
Published: 03/16/2022

This blog was originally published by CXO REvolutionaries here. Written by Martyn Ditchburn, Director of Transformation Strategy, Zscaler. People sometimes ask me what it felt like to complete a full multi-year migration journey from on-premise hosting into the cloud. My answer is always the same...

Legacy Cybersecurity is an Albatross: Digital Success Needs a Better Model
Published: 03/08/2022

This blog was originally published by CXO REvolutionaries here. Written by Rohit Adlakha, Chief Digital & Information Officer and Global Head, Wipro HOLMES™ (former). The security market is growing exponentially. But is it growing the right way, or is it just more of the same?Digital disruption i...

How Zero Trust Security Will Revolutionize DevSecOps
Published: 03/01/2022

This blog was originally published by Appgate here. Written by Kurt Glazemakers, Appgate. Due to the rise of the cloud and containers, software development has made giant steps forward in productivity, agility and scale. DevOps and DevSecOps have created controlled, easily deployable, secure and ...

Pfizer IP Leak Isn’t Unique. Protect Your Cloud Data With Proactive Encryption.
Published: 02/25/2022

This blog was originally published by Lookout on December 17, 2021. Written by Hank Schless, Senior Manager, Security Solutions, Lookout. The pharmaceutical company Pfizer recently acknowledged that thousands of internal documents were leaked, including trade secrets related to its COVID-19 vacci...

The North Star Your Cloud Strategy Needs
Published: 02/25/2022

This blog was originally published by Booz Allen here. Written by Delie Minaie, Booz Allen. Orient cloud success around mission assuranceAs IT leaders throughout the federal government look to guide their agencies toward enterprise-wide cloud maturity, they are met with endless choices regarding ...

Security Service Edge (SSE) Reflects a Changing Market: What You Need to Know
Published: 02/24/2022

This blog was originally published by CXO REvolutionaries here. Written by Sanjit Ganguli, VP Transformation Strategy/Field CTO - Global Enterprise, Zscaler. What the world needs is another acronym in cyber security, said absolutely NO ONE. However, as a former Gartner analyst who helped bring my...

How CISOs Are Preparing to Tackle 2022
Published: 02/21/2022

This blog was originally published by Microsoft here. Written by Vasu Jakkal, Corporate Vice President, Security, Compliance, Identity, and Management, Microsoft. Looking back over the last year, the security landscape has continued to experience significant change and escalation. Every day, ...

The Evolution of Cloud Security in 2022
Published: 02/16/2022

This blog was originally published by G2 here. Written by Aaron Walker, G2. This post is part of G2's 2022 digital trends series.Unified security for the distributed cloudIn the early days of cloud computing, businesses had a simple choice: adopt or don’t. Back then, security was a secondary conc...

Browse by Topic
Write for the CSA blog
Submit your blog proposal

Sign up to receive CSA's latest blogs

This list receives 1-2 emails a month.