Category Archives: Cloud Security Alliance

Category Added in a WPeMatico Campaign

When a Breach Occurs, Are We Ready to Minimize the Operational Effects

Written by Dr. Vito Nozza, Softchoice.“Plan for what is difficult while it is easy, do what is great while it is small” Sun TzuI love to quote Sun Tzu, as the art of war is indicative of what cyber professionals go through on a daily grind. The offensive security mindset and techniques that are researched […]

The Future of Compliance: Adapting to Digital Acceleration and Ephemeral Technologies

Originally published by RegScale.As we move towards 2030, the landscape of governance, risk, and compliance (GRC) is undergoing a seismic shift. With the rapid digital acceleration, the pervasive adoption of cloud technologies, and the rise of ephemeral tech, organizations are faced with unprecedented challenges… but also major opportunities. To thrive in this evolving environment, businesses […]

Securing Staging Environments: Best Practices for Stronger Protection

Originally published by Entro.Staging environments often serve as the critical last step before pushing code to production, mirroring the setup used in live systems. However, these environments are often neglected in terms of security, making them prime targets for breaches and vulnerabilities.Staging environments are typically more controlled than development but less scrutinized than production, leading […]

ChatGPT and GDPR: Navigating Regulatory Challenges

Originally published by Truyo.As artificial intelligence technologies like OpenAI’s ChatGPT advance, they encounter increasing scrutiny from regulatory bodies, particularly concerning data protection and privacy. The European Data Protection Board (EDPB) has been investigating whether ChatGPT complies with the General Data Protection Regulation (GDPR). This blog explores the key issues identified by the EDPB, how the […]

Empowering Snowflake Users Securely

Originally published by Normalyze.Written by Joe Gregory.Two security leaders address data sprawl, user access, compliance, and scaleI recently moderated a webinar titled Unlocking the Power of Snowflake about the top challenges organizations face today: how to maximize their Snowflake investment, provide secure user access, and address the challenges of data sprawl and visibility, compliance, and […]

Identity Breaches in 2024 – An Ounce of Hygiene is Worth a Pound of Technology

Originally published by Pentera.Identity is a key to open a doorWho are you? Yes, you reading. Who are you?There’s probably a lot of ways you can answer that question, and that is because there are a lot of attributes that make up your identity. Let’s keep things simple because that’s what’s easy: name, date of […]

How to Get your Cyber Essentials Certification: A Process Guide

Originally published Vanta.Most organizations today are heavily reliant on technology, regardless of the product or service they provide. This expands their data exposure points and potential attack surface, which is why there is a significant need to monitor the risks and vulnerabilities in the cybersecurity landscape.Cyber Essentials certification is a comprehensive cybersecurity strategy involving vigilance […]

Tackling Ransomware Head-On: A Business’s Guide to Understanding and Defense

Originally published by Richey May.In today’s cybersecurity landscape, threats are more than just a cautionary tale—they’re a daily reality, and ransomware tops the list of concerns. This aggressive form of cyberattack can grind operations to a halt and compromise sensitive data. Keep reading, we’ll unpack how ransomware works, break down its mechanics and highlight how […]

According to Cloud Security Alliance Survey More than Half of Organizations Cite Technical Debt as Top Hurdle to Identity System Modernization

Report also found that over 75% of enterprises are using two or more IDPs and struggle to manage access controls and consistent security policiesSEATTLE – Oct. 30, 2024 – Modernizing identity systems is proving difficult for organizations due to two key challenges: decades of accumulated Identity and Access Management (IAM) technical debt and the complexity […]

Streamlining Cloud Security: Integrating CSA CCM Controls into Your ISO/IEC 27001 Framework

In today’s rapidly evolving security landscape, it can be overwhelming to manage multiple frameworks, especially for organizations striving for excellence in cloud security. The CSA Cloud Controls Matrix (CCM) is a gold standard in cloud security governance, providing a detailed map of best practices. However, if you already have an ISO/IEC 27001 Information Security Management […]

This site uses cookies to offer you a better browsing experience. By browsing this website, you agree to our use of cookies. Click More Info to view Privacy Policy.