Category Archives: Cloud Security Alliance

Category Added in a WPeMatico Campaign

The Emerging Cybersecurity Threats in 2025 – What You Can Do To Stay Ahead

Contributed by Softchoice.Written by Abel E. Molina, Principal Architect, Security, Microsoft.As we look ahead to 2025, the landscape of cyber threats is evolving at a rapid pace, posing significant challenges for businesses, governments, and individuals. As the first blog of the year, I felt it appropriate to list the top 10 emerging cybersecurity threats of […]

How Illumio Simplified eBay’s Large-Scale Microsegmentation Project

Originally published by Illumio.For global e-commerce giant eBay, the cybersecurity stakes couldn’t be higher. It manages millions of transactions and customer interactions every day. The company’s success is built on buyers’ and sellers’ trust in its platform. This is why eBay turned to Illumio for microsegmentation. It wants to make sure potential breaches and ransomware […]

The Trouble with Large Language Models and How to Address AI “Lying”

Originally published by Schellman.Written by Avani Desai, CEO, Schellman.Even as AI systems become more advanced and enmeshed in daily operations, concerns regarding whether large language models (LLMs) are generating accurate and true information remain paramount throughout the business landscape. Unfortunately, the potential for AI to generate false or misleading information—often referred to as AI “hallucinations”—is […]

Adapting Strong IAM Strategies to Combat AI-Driven Cyber Threats

Written by Jordi Vilanova, Cloudtango.In early 2024, T-Mobile experienced a significant data breach where attackers exploited weak IAM controls to gain access to the personal information of over 30 million customers. The attackers used a combination of phishing attacks and stolen credentials to bypass security measures. This incident led to sensitive data, including names, addresses, […]

Your Essential 10-Step GDPR Compliance Checklist

Originally published by Vanta.Written by Jess Munday.If your business entails collecting and/or processing the personal data of European Union (EU) or United Kingdom (UK) citizens, complying with the General Data Protection Regulation (GDPR) is a priority.‍The regulation is quite comprehensive and includes numerous requirements your organization must implement. Adapting to its various requirements around transparency, […]

Navigating Cloud Challenges with Repatriation

Written by Rajesh Awasthi, VP & Global Head of Managed Hosting and Cloud Services, Tata Communications.Originally published by DQ India.Cloud computing has transformed business operations with its scalability, flexibility, and cost-efficiency, encouraging organisations to modernise their IT infrastructure. According to Gartner’s, latest forecast, spending by end-users on public cloud services is expected to grow 20.4% […]

Lanes in the Road: How Small and Medium Businesses Can Allocate Cybersecurity Responsibility

Originally published by Scrut Automation.Written by Nicholas Muy, Chief Information Security Officer, Scrut Automation.After suffering a devastating ransomware attack in early 2023, the law firm Mastagni Holstedt turned around and sued its Managed Service Provider (MSP), LanTech. While the legal case is still open, some important details from it illustrate key lessons for small and […]

The Critical Role of OT Security in the Oil and Gas (O&G) Industry

Originally published by HCLTech.Written by Devkant Sharma, Group Manager, PMG Lead, Cybersecurity, HCLTech.In today’s increasingly digitized world, Operational Technology (OT) systems, which encompass the hardware and software that monitor and control physical devices, processes and events, are the lifeblood of O&G industry operations. These systems manage everything from exploration and production to refining and distribution, […]

Modern Day Vendor Security Compliance Begins with the STAR Registry

We require a modern approach to accurately assess our use of current technology.This month marks 25 years since I managed my first cybersecurity attack. At the time, I was CTO for an internet service provider that suffered the compromise, which in those days was mostly script kiddies defacing webpages to show they had circumvented what […]

How to Demystify Zero Trust for Non-Security Stakeholders

Written by Erick Tauil, Presales Engineer.Alright, let’s dive into a topic that often feels like a riddle wrapped in an enigma: Zero Trust. Communicating its concepts to non-security stakeholders can be quite frustrating and often met with a blank stare. After 15 years in cybersecurity, I’ve seen how a little confusion can derail even the […]