CloudSecurityAlliance(@cloudsa) 's Twitter Profileg
CloudSecurityAlliance

@cloudsa

The CSA is a not-for-profit org promoting best practices for providing security assurance within Cloud Computing @[email protected]

ID:26565989

linkhttp://www.cloudsecurityalliance.org calendar_today25-03-2009 19:11:06

15,5K Tweets

18,4K Followers

231 Following

CloudSecurityAlliance(@cloudsa) 's Twitter Profile Photo

Today’s Word of the Week is: Proxy 🚪! A proxy is any gateway, service, or appliance that acts as an intermediary between a client and a server. Read all about 2019’s Capital One breach, where the initial point of compromise was a misconfigured proxy → e.cloudsecurityalliance.org/l/908632/2024-…

Today’s Word of the Week is: Proxy 🚪! A proxy is any gateway, service, or appliance that acts as an intermediary between a client and a server. Read all about 2019’s Capital One breach, where the initial point of compromise was a misconfigured proxy → e.cloudsecurityalliance.org/l/908632/2024-…
account_circle
CloudSecurityAlliance(@cloudsa) 's Twitter Profile Photo

Tom McKay hid on after leaving his company by assuming the persona of 'Slackbot'' and changing his profile picture to an angrier version of Slackbot's icon 🤖. Adaptive Shield explains how this escapade brings up more serious security challenges → e.cloudsecurityalliance.org/l/908632/2024-…

account_circle
CloudSecurityAlliance(@cloudsa) 's Twitter Profile Photo

Enterprises face data breach risks like weak passwords, insider threats, and malware. Solutions include multi-factor authentication and user behavior analytics for detecting anomalies.

e.cloudsecurityalliance.org/l/908632/2024-…

account_circle
CloudSecurityAlliance(@cloudsa) 's Twitter Profile Photo

Prioritize for effective data protection. Small teams can overcome challenges with strategy, leadership support, automation, and learning.

Learn more here → e.cloudsecurityalliance.org/l/908632/2024-…

account_circle
CloudSecurityAlliance(@cloudsa) 's Twitter Profile Photo

In January, Snyk discovered 4 that target runC & BuildKit components in Docker environments. These vulns could facilitate container escapes that allow bad actors to infiltrate the underlying host system. Orca Security breaks it down: e.cloudsecurityalliance.org/l/908632/2024-…

account_circle
CloudSecurityAlliance(@cloudsa) 's Twitter Profile Photo

In today's digitally interconnected world 👩‍💻, understanding the landscape of & vulnerabilities is crucial. In this blog post, we define 7 terms that will help you understand what threats & vulnerabilities are & what you can do about them: e.cloudsecurityalliance.org/l/908632/2024-…

account_circle
CloudSecurityAlliance(@cloudsa) 's Twitter Profile Photo

Smooth requires meticulous coordination across tools, teams, and schedules. With so many different dimensions, intricate planning and cross-functional excellence is critical. Tamnoon shares the key steps you need to follow: e.cloudsecurityalliance.org/l/908632/2024-…

account_circle
CloudSecurityAlliance(@cloudsa) 's Twitter Profile Photo

In the digital era, data security is paramount. SOC 2 ensures it. Privacy focuses on personal data protection, while confidentiality safeguards broader sensitive information.

Read more → e.cloudsecurityalliance.org/l/908632/2024-…

account_circle
CloudSecurityAlliance(@cloudsa) 's Twitter Profile Photo

Forrester reports that over 63% of organizations are struggling to implement Architectures, with lack of talent being a key issue. Check out this blog to learn what ZT knowledge your team needs to know & how the CCZT can help → e.cloudsecurityalliance.org/l/908632/2024-…

account_circle
CloudSecurityAlliance(@cloudsa) 's Twitter Profile Photo

Microsoft's Copilot AI poses data leakage risks in 365, requiring safeguards and SSPM solutions for proactive security.

Learn more in this blog by Reco → e.cloudsecurityalliance.org/l/908632/2024-…

account_circle
CloudSecurityAlliance(@cloudsa) 's Twitter Profile Photo

Learn how a data-centric security approach enables modern data teams to innovate rapidly without compromising on security. Dive into part 2 of this insightful blog series by Uday Srinivasan, Co-founder & CTO of Acante. e.cloudsecurityalliance.org/l/908632/2024-…

account_circle
CloudSecurityAlliance(@cloudsa) 's Twitter Profile Photo

The landscape is shifting to real-time approaches that monitor system activity safely within the kernel by using , as evident by projects like Tetragon & Tracee. Learn all about kernel introspection in this comprehensive Sysdig blog → e.cloudsecurityalliance.org/l/908632/2024-…

account_circle
CloudSecurityAlliance(@cloudsa) 's Twitter Profile Photo

Microsoft’s AI surfaces organizational data to deliver users a seamless workflow experience. Still, tools raise the risk of inadvertent exposure of sensitive information. Cyera explains what is & its risks: e.cloudsecurityalliance.org/l/908632/2024-…

account_circle
CloudSecurityAlliance(@cloudsa) 's Twitter Profile Photo

Today’s Word of the Week is: ☁️🐦! A secure cloud migration is critical towards ensuring efficient and compliant operations. This blog describes some foundational principles across industries for securing an organization’s cloud: e.cloudsecurityalliance.org/l/908632/2024-…

Today’s Word of the Week is: #CloudMigration ☁️🐦! A secure cloud migration is critical towards ensuring efficient and compliant operations. This blog describes some foundational principles across industries for securing an organization’s cloud: e.cloudsecurityalliance.org/l/908632/2024-…
account_circle
CloudSecurityAlliance(@cloudsa) 's Twitter Profile Photo

The indispensable nature of email makes it the primary attack vector for bad actors - email attacks have been the leading cause of cybercrime losses for the past 7 years. Abnormal Security shares 10 considerations to shape your email strategy: e.cloudsecurityalliance.org/l/908632/2024-…

account_circle
CloudSecurityAlliance(@cloudsa) 's Twitter Profile Photo

Migrating from to the is a big leap for businesses, but it also brings new security challenges, namely in the form of . David Balaban explains how to handle these challenges and stay secure. e.cloudsecurityalliance.org/l/908632/2024-…

account_circle
CloudSecurityAlliance(@cloudsa) 's Twitter Profile Photo

, with its ability to create seemingly magical outputs from text to code, is undeniably exciting. However, lurking beneath this shiny surface lies a Pandora's box 📦 of potential risks that demand immediate attention. Get an overview of the risks → e.cloudsecurityalliance.org/l/908632/2024-…

account_circle
CloudSecurityAlliance(@cloudsa) 's Twitter Profile Photo

The treasure hunt for poses a challenge in today's global marketplace. Dive into the complexities of and vendor relationships with insights from the Security Sessions Podcast by Thales Cloud Security. Read more here: e.cloudsecurityalliance.org/l/908632/2024-…

account_circle
CloudSecurityAlliance(@cloudsa) 's Twitter Profile Photo

As your business grows, you also outgrow your existing processes. Recognizing when and how to audit these outdated processes is essential for keeping your org secure. Explore a template created by Vanta to help with these audits → e.cloudsecurityalliance.org/l/908632/2024-…

account_circle
CloudSecurityAlliance(@cloudsa) 's Twitter Profile Photo

The days of the as the lone wolf 🐺 are over. today demands a business-savvy superhero 🦸 who understands the intricate dance of protecting the organization while supporting its growth. Zscaler CISO Ben Corll explores what this means: e.cloudsecurityalliance.org/l/908632/2024-…

account_circle