The Inner Circle

 View Only

Latest Discussion Posts

  • Olivia, I'm sorry to say that now that you've discovered the secret of the hidden web pages, ... no, just kidding! You're quite right to be concerned about this. Assuming for a moment it's not a query problem - I have been noticing these last six months ...

    1 person likes this.
  • This is a good observation. I had a short stint with security, but I had considerable experience in IT Industry. Though I did clear CISSP which was an enabler to get a Security Architect/Lead role, I would like to know more about entry level jobs and ...

    2 people like this.
  • This message was posted by a user wishing to remain anonymous Most "entry level" jobs are not listed publicly to the world, which is why proper networking and personal branding are so critical. An example is a person that networked with me and built ...

    2 people like this.
  • While allowing users to pay $8 a month to become verified on Twitter was a good idea at the time to bring in revenue, it opened up a surge of #fake accounts posing as reputable people or businesses becoming verified. #Impersonators include ...

    1 person likes this.
  • Dear Members, CSA and the CCM WG are interested to kick-off a new project for developing guidelines that pertain to the Shared Security Responsibility Model (SSRM) and that are to be tailored to each of the total of 197 CCMv4 control specifications. ...

Announcements

  • Upcoming Cloudbyte Webinars

    Ermetic - How Does Your Cloud Security Compare, and Where Do You Go From Here?
    Date: 12/5/22
    Time: 6:00 PM UTC
    Register Here → https://csaurl.org/dr0crt

    Microsoft - Achieving the Principle of Least Privilege Across Multicloud with CIEM!
    Date: 12/6/22
    Time: 10:00 AM CST
    Register Here → https://csaurl.org/nemtcm

    AppOmni - Is PHI Secure in SaaS Applications - And Their Ecosystems?
    Date: 12/7/22
    Time: 1:00 PM CST
    Register Here → https://csaurl.org/adcdwe

    Rubrik - A Fireside Chat: The Human Effects of Cybercrime
    Date: 12/8/22
    Time: 1:00 PM CST
    Register Here → https://csaurl.org/29hfbr

  • November Research Releases

    Top Threats to Cloud Computing - Pandemic Eleven - Japanese Translation
    Release Date: 11/16/22
    Summary: The Top Threats reports have traditionally aimed to raise awareness of threats, risks, and vulnerabilities in the cloud. Such issues are often the result of the shared, on-demand nature of cloud computing. In this sixth installment, we surveyed 703 industry experts on security issues in the cloud industry. This year our respondents identified eleven salient threats, risks, and vulnerabilities in their cloud environments. The Top Threats Working Group used the survey results and its expertise to create the 2022 Top Cloud Threats report - the ‘Pandemic Eleven’. 
    Download this Resource → https://csaurl.org/f6mo0a

    Zero Trust as a Security Philosophy
    Release Date: 11/14/22
    Summary: This paper takes both a vendor-neutral and technology-solution-neutral look at what Zero Trust means for your organization and provides recommendations to develop a strategy and the supporting architecture that supports the organization and its workflows; aligning IT to business goals and outcomes.
    Download this Resource → https://csaurl.org/x37jur

  • Open Peer Reviews

    Security Guidance for Critical Areas of Focus in Cloud Computing v5 - Outline
    Open Until: 12/07/2022
    Learn More → https://csaurl.org/r47b8i

    Telesurgery Tabletop Guide Book
    Open Until: 12/16/2022
    Learn More → https://csaurl.org/8ynvbi

    Security Guidance for Critical Areas of Focus in Cloud Computing v5 - Section 2: Organization Management
    Open Until: 12/18/2022
    Learn More → https://csaurl.org/2zbqqg