Originally published by Aembit.Written by Ashur Kanoon, Technical Product Marketing, Aembit.How much damage could an attacker do with free tools and minimal effort? That’s the question I set out to answer – and the results even surprised me. In less than 10 minutes, I managed to exploit exposed API keys, hijack resources, and prove just […]
Category Archives: Cloud Security Alliance
Category Added in a WPeMatico Campaign
Originally published by HanaByte.Written by Otis Thrasher, Staff Security Consultant, HanaByte.Life is full of ups and downs, and no one can avoid them. This includes natural disasters, accidents, and loss of loved ones. The digital world operates on a similar principle. It’s not a question of if a cyber attack or system failure will happen; […]
Contributed by Softchoice.Written by Abel E. Molina, Principal Architect, Security, Softchoice.The Critical Need for Zero TrustThe threat of cyber-attacks is both immediate and severe. According to the Small Business Administration (SBA), 50% of SMBs have faced at least one cyber-attack, with over 60% of those businesses shutting their doors afterward. This alarming statistic underscores the […]
Originally published by CXO REvolutionaries.Written by Pam Kubiatowski, Global VP, CTO in Residence, Zscaler.Enterprises transform network architectures to be more agile and better able to meet business goals. But transitioning your network from a traditional hub-and-spoke to a cloud services model can be daunting. However, the cost of change is ultimately often less than the […]
Originally published by Schellman.Written by Ryan Buckner.These days, every organization has a security program to protect themselves from escalating attacks with growing sophistication. And while much of the focus centers on defending against outsider threats, an equally important component of any security effort is safeguarding against insider threats through effective employee awareness. Maybe your organization […]
CSA’s Cloud Controls Matrix (CCM) is a security framework for cloud computing. It contains 197 control objectives structured into 17 domains. These domains cover all key aspects of cloud technology.You can use CCM to systematically assess a cloud implementation. CCM also provides guidance on which actors within the cloud supply chain should implement which controls.CCM […]
Originally published by Vanta.HIPAA, an acronym for the Health Insurance Portability and Accountability Act, is one of the most important federal regulatory frameworks for healthcare organizations. It’s an elaborate law that imposes many stringent requirements for patient privacy and data security on governed organizations. Complying with HIPAA demands having a strict internal system to address […]
Originally published by Abnormal Security.Written by Emily Burns.Artificial Intelligence (AI) has reshaped nearly every industry, but its impact on cybersecurity is particularly transformative. While AI opens doors to unparalleled efficiencies and innovation, it also gives rise to a new generation of cyberthreats that are faster, smarter, and more adaptable than ever. Recent findings from Osterman […]
Written by CSA’s Top Threats Working Group.In this blog series, we cover the key security challenges from CSA’s Top Threats to Cloud Computing 2024. Drawing from the insights of over 500 experts, we’ll discuss the 11 top cybersecurity threats, their business impact, and how to tackle them. Whether you’re a professional or a beginner, this […]
Data loops at the center of ZTA and CTEM can boost your cyber programWritten by Chris Jablonski, Director, CXO Revolutionaries & Community. In 2011, Google released a groundbreaking report called ZMOT: Winning the Zero Moment of Truth, sending shockwaves across the marketing world. ZMOT refers to the moment when a consumer researches a product before […]