ChaptersCircleEventsBlog
Join us for the in-person CCSK Azure course at Black Hat from August 4–5! Register now for a hands-on deep dive and secure your spot now!

Announcements

Announcements
CSA Report Surfaces Cloud Attack Patterns
CSA Report Surfaces Cloud Attack Patterns

Security Boulevard

September 25, 2020

Prevent cloud account hijacking with 3 key strategies
Prevent cloud account hijacking with 3 key strategies

SearchCloudSecurity

September 24, 2020

Analysis of attacks reveals the top threats to cloud computing
Analysis of attacks reveals the top threats to cloud computing

Beta News

September 23, 2020

Cloud Security Alliance Releases Top‌ ‌Threats‌ ‌to‌ ‌Cloud‌ ‌Computing:‌ ‌Egregious‌ 11‌ Deep‌ ‌Dive‌; Articulates Cloud Computing’s Most Significant Issues‌
Cloud Security Alliance Releases Top‌ ‌Threats‌ ‌to‌ ‌Cloud‌ ‌Computing:‌ ‌Egregious‌ 11‌ Deep‌ ‌Dive‌; Articulates Cloud Computing’s Most Significant Issues‌

Container Journal

September 23, 2020

The three main ingredients for the successful implementation of Zero Trust in the time of COVID-19: Machine learning, carta and software defined perimeter
The three main ingredients for the successful implementation of Zero Trust in the time of COVID-19: Machine learning, carta and software defined perimeter

Security Magazine

September 15, 2020

The evolution of cloud security access brokers (CASB)
The evolution of cloud security access brokers (CASB)

Security Magazine

September 15, 2020

Cloud Security Alliance study finds while CASB demand is high, additional education is needed
Cloud Security Alliance study finds while CASB demand is high, additional education is needed

Intelligent CIO ME

September 8, 2020

Cloud shared responsibility models are misunderstood, report says
Cloud shared responsibility models are misunderstood, report says

CIO Dive

September 3, 2020

The Essential Cloud Security Books for Cybersecurity Professionals
The Essential Cloud Security Books for Cybersecurity Professionals

Solutions Review Enterprise Cloud

August 31, 2020

Misconfiguration on the Cloud is as Common as it is Costly
Misconfiguration on the Cloud is as Common as it is Costly

Infosecurity Magazine

August 28, 2020

Cloud Compliance Frameworks: What You Need to Know
Cloud Compliance Frameworks: What You Need to Know

Security Boulevard

August 25, 2020

Cloud Security Alliance, ISACA Announce Strategic Partnership To Reinvent Cloud Auditing And Assurance
Cloud Security Alliance, ISACA Announce Strategic Partnership To Reinvent Cloud Auditing And Assurance

AIthority

August 18, 2020

How the network can support zero trust
How the network can support zero trust

Reseller News

August 18, 2020

A Big Miss: Just 21% of Organizations Use Cloud Access Security Brokers
A Big Miss: Just 21% of Organizations Use Cloud Access Security Brokers

Channel Futures

August 17, 2020

Companies Team Up to Offer Cloud Auditing Certificate
Companies Team Up to Offer Cloud Auditing Certificate

Infosecurity Magazine

August 17, 2020

What is Zero Trust Network Access (ZTNA)?
What is Zero Trust Network Access (ZTNA)?

SDxCentral

August 14, 2020

WFH Pressures Accelerate Cloud Security Demand
WFH Pressures Accelerate Cloud Security Demand

Security Boulevard

August 13, 2020

Businesses underutilising cloud security due to lack of education and training
Businesses underutilising cloud security due to lack of education and training

SecurityBrief Australia

August 12, 2020

IT teams can't fully utilize cloud security solutions due to understaffing
IT teams can't fully utilize cloud security solutions due to understaffing

ITProPortal

August 12, 2020

Half of IT teams can’t fully utilize cloud security solutions due to understaffing
Half of IT teams can’t fully utilize cloud security solutions due to understaffing

Helpnet Security

August 12, 2020