Tag - security

Cloud Security in 2024: Insecure Identities

Originally published by Tenable. Written by Diane Benjuya. What issues affect cloud security teams today? How are they tackling these challenges? Which tools do they use to measure success? These are just a few of the questions Tenable sought to answer in its recently published “2024 Cloud Security Outlook” report, our annual assessment of organizations’...

Cloud Security Alliance RFI: Leveraging GenAI

Written by Jim Reavis, Co-founder and Chief Executive Officer, CSA. This blog is markedly different from any other I have posted on our website. While we have responded to a few Requests for Proposal (RFP) or Requests for Information (RFI) over the past 15 years, the Cloud Security Alliance has never issued one ourselves, until now. Technology is moving at a...

IT-OT Convergence: Enhancing Security and Efficiency

Written by S Sreekumar, VP and Global Practice Head, Cybersecurity, HCLTech and José Grandmougin, Senior Director Consulting System Engineering GSI and OT, Fortinet. In the ever-evolving landscape of digital transformation, the convergence of Information Technology (IT) and Operational Technology (OT) emerges as a pivotal paradigm shift. Understanding the...

Cloud Security in 2024: A Shifting Landscape

Written by Thales. As cloud infrastructures become integral to business operations, securing them is climbing the priority ladder for businesses in every sector. In fact, cloud security is a top concern for nearly two-thirds (65%) of security and IT management professionals now, and 72% claim it will be even more so in the future. These figures were revealed in the...

Building Security Around Human Vulnerabilities

Written by Benjamin Corll, CISO in Residence, Zscaler. Why are organizations spending money on cybersecurity solutions when studies show 88% of data breaches are caused by human mistakes? If you’re a cybersecurity leader you have probably heard some variation of this question from people skeptical of our industry. The implication is that it’s unwise to buy...

AI Deepfake Security Concerns | CSA

In light of the most revolutionary technology ever introduced, CSA’s SECtember.ai conference will feature three days of insightful sessions and active discussions about navigating the future of AI and cloud security. SECtember.ai will take place on September 10-12, 2024 at the Meydenbauer Center in Bellevue, WA. In preparation for this important event, members of...

Educating the Security Industry with CISO Rick Doten

Written by Megan Theimer, Content Program Specialist, CSA. Can you believe that CSA has been defining and raising awareness of cloud security best practices for 15 years? Over the course of these several years, we’ve been educating the community with our volunteer-driven research publications, trainings, certificate programs, in-person and virtual events, and many...

Cloud Security: Strategic Prevention Methods

Originally published by Tamnoon. Written by Michael St.Onge, Principal Security Architect, Tamnoon. In the fast-evolving cloud security landscape, successful remediation isn’t just about fixing issues when they arise – it’s equally about preventing the recurrence of these issues. Prevention is the final, critical stage of the cloud security remediation process. After...

CNAPP, CIEM & Cloud Security Maturity

Originally published by Tenable. Written by Shai Morag. Security professionals are used to protecting on-premises resources, but the cloud is more complex than on-prem – especially in multi-cloud environments. Meanwhile, breaches are happening at a furious pace. The new Tenable 2024 Cloud Security Outlook report shows that 95% of organizations reported a cloud...

Kubernetes Security: Managed or Self-Hosted?

Originally published by Tenable. Written by Mark Beblow. Many enterprises have adopted container technology because it helps them to streamline the building, testing and deploying of applications. The benefits of container technology include better resource efficiency, portability, consistency and scalability. However, as organizations ramp up the number of deployed...