Cybersecurity Articles

CSA Security Metrics for the Cloud

CSA launched the Continuous Audit Metrics Working Group in early 2020 to build the first catalog of security metrics for the cloud. CSA released the first version of this catalog that contains an initial set of 34 security metrics, each mapped to the CCM v4. These metrics aim to support internal CSP governance, risk, and compliance (GRC) activities and provide a helpful baseline for service-level agreement transparency. <<


[Guide] The Continuous Audit Metrics Catalog

https://lnkd.in/d-5Msqb5

Heat Attacks: A new class of Cyberattacks organizations are not prepared for

HEAT attacks: A new class of cyber threats organizations are not prepared for: Web malware (47%) and ransomware (42%) now top the list of security threats that organizations are most concerned about. Yet despite the growing risks, just 27% have advanced threat protection in place on every endpoint device that can access corporate applications and resources. This is according to a research published by Menlo Security, exploring what steps organizations are taking to secure themselves in the wake of a new class of cyber threats – known as Highly Evasive Adaptive Threats (HEAT). Click Here to read more

Insider Threat a Major Cause of Cybersecurity Concern

One of the most critical aspects of safeguarding the IT assets of any corporation is dealing with the Insider's Threat. 


With so many diversified IT components, it is a real challenge to design an effective IT security strategy. It is critical to recognize this particular threat and take countermeasures to protect your assets.


What to do?