Category Archives: Cloud Security Alliance

Category Added in a WPeMatico Campaign

Data Governance in the Cloud

Written by Ashwin Chaudhary, CEO, Accedere. As all organizations are moving towards the digitization of data and cloud computing, it is important to protect and ensure data governance by all organizations. New data security solutions are needed considering data digitization and cloud computing. According to Gartner, “By 2025, 80% of organizations seeking to scale digital […]

Zero Trust Messaging Needs a Reboot

Written by Daniel Ballmer, Senior Transformation Analyst, CXO REvolutionaries, Zscaler.It’s 2024, and Zero Trust adoption across industries remains somewhere below 33%. For reference, de-perimeterization, a stepping-stone to Zero Trust, was first discussed on the Jericho Forums twenty years ago. By 2010, the term Zero Trust was a staple of cybersecurity conversations. Now, public and private […]

The Latest Microsoft Midnight Blizzard Breach is a Wakeup Call for SaaS Security

Originally published by Valence. Microsoft recently published new guidance on the nation-state attack that they initially disclosed on January 19. According to Microsoft, the Russian state-sponsored threat actor Midnight Blizzard (also known as NOBELIUM or APT29) was able to leverage a test tenant account and a legacy OAuth application to gain access to corporate email […]

Addressing Microsoft Teams Phishing Threats

Originally published by Adaptive Shield.Written by Hananel Livneh. AT&T Cybersecurity recently discovered phishing attacks conducted over Microsoft Teams. During a group chat, threat actors distributed malicious attachments to employees, which led to the installation of DarkGate malware on the victim’s systems. This attack shines a bright light on the everchanging phishing surface as it expands […]

Ransomware Unveiled: The Business Impact and Prevention Strategies

Originally published by Schellman. In the ever-evolving digital landscape, the sophistication of cybersecurity advances runs in parallel with the advancing cyberattacks. Among these varied threats, ransomware, and what can be its devastating impact, remains a prominent concern as it becomes clear that no organization is safe. It’s important to remember that even companies deemed highly […]

A CISO Primer for Staying on the Right Side of the SEC’s Cyber Materiality Rules

Originally published by CXO REvolutionaries.Written by David Cagigal, Former CIO, State of Wisconsin.When the SEC charged SolarWinds CISO Tim Brown and his employer with fraud and internal control failure that led to the 2020 supply chain cyberattack, CISOs of public companies collectively shuddered. The expected skill, decision-making authority, and transparency of trusted company technology leaders […]

Preparing for the Era of Post-Quantum Cryptography

Originally published by HCLTech. Written by Girish Kumar Vaideeswaran, Data Security Consultant, Data Security and Data Privacy, Cybersecurity, HCLTechComputers! What an innovation it has been, incepting from the general-purpose ENIAC, which was approximately housed in a 2000 square foot space weighing around 30 tons, to the currently hand-held computing devices which are multifold powerful accomplishing […]