Category Archives: Cloud Security Alliance

Category Added in a WPeMatico Campaign

Modern Day Vendor Security Compliance Begins with the STAR Registry

We require a modern approach to accurately assess our use of current technology.This month marks 25 years since I managed my first cybersecurity attack. At the time, I was CTO for an internet service provider that suffered the compromise, which in those days was mostly script kiddies defacing webpages to show they had circumvented what […]

How to Demystify Zero Trust for Non-Security Stakeholders

Written by Erick Tauil, Presales Engineer.Alright, let’s dive into a topic that often feels like a riddle wrapped in an enigma: Zero Trust. Communicating its concepts to non-security stakeholders can be quite frustrating and often met with a blank stare. After 15 years in cybersecurity, I’ve seen how a little confusion can derail even the […]

Why Digital Pioneers are Adopting Zero Trust SD-WAN to Drive Modernization

Originally published by CXO REvolutionaries.Written by Mike Gemza, CTO, Cornerstone Building Brands.At a time when cyberthreats are becoming more advanced and network infrastructure needs are increasing, it’s not just important to use a zero trust approach to software-defined wide-area networks (SD-WAN). It’s also essential. As connectivity keeps changing, those who use new solutions like zero […]

The EU AI Act and SMB Compliance

Originally published by Scrut Automation.Written by Nicholas Muy, Chief Information Security Officer, Scrut Automation.On July 12, 2024, the European Union (EU) Official Journal published the full text of the AI Act. This set into motion the final chapter of the most impactful security and privacy law since the General Data Protection Regulation (GDPR) came into […]

Managed Security Service Provider (MSSP): Everything You Need to Know

Originally published by Vanta.The security and compliance landscape is ever-evolving, meaning the demands organizations need to meet today can change rapidly. While most IT teams have defined processes to handle these requirements, they may not have the capacity to address all the tasks necessary to maintain the organization’s security posture.‍If your organization has encountered a […]

Decoding the Volt Typhoon Attacks: In-Depth Analysis and Defense Strategies

Originally published by InsiderSecurity.The Volt Typhoon campaign has raised alarms across cybersecurity circles, targeting critical infrastructure with stealthy and sophisticated techniques. This analysis breaks down the methods, exploitation tactics, and practical defenses organizations can employ to safeguard their systems.Volt Typhoon Attacks On May 24, 2023, Microsoft and the “Five Eyes Alliance” cybersecurity information sharing organization […]

Zero-Code Cloud: Building Secure, Automated Infrastructure Without Writing a Line

Written by Rahul Kalva.Abstract In today’s fast-paced DevOps environment, the demand for agile infrastructure deployment is driving innovation beyond traditional Infrastructure-as-Code (IaC). Code-less deployment solutions represent a breakthrough, enabling teams to automate infrastructure setup without the need for extensive coding. This article explores how code-less automation improves deployment efficiency while maintaining robust security and compliance. […]

Level Up Your Cloud Security Skills With This Jam-Packed Training Bundle

Written by Kayla Mauriello.Seasoned cybersecurity professionals from CTOs to developers are facing a challenging situation: organizations transitioning to new cloud architecture are invariably exposed to new vulnerabilities that traditional security measures don’t address. Keeping pace with the evolution of cloud infrastructure security techniques and principles requires a new approach and upgraded skill sets.The Cloud Infrastructure […]

New Report from Cloud Security Alliance Highlights Key Aspects of Data Resiliency in the Financial Sector

Findings emphasize the importance of regulatory compliance, strategic cloud adoption, regional considerations, and the need for continuous improvement in security practices SEATTLE – Dec. 10, 2024 – Financial institutions (FIs) are cautiously but increasingly adopting cloud technologies, while simultaneously placing greater value on multi-cloud strategies in order to avoid vendor lock-in and enhance data sovereignty, […]