The Latest News & Insights

    What Is DSPM in Cyber Security and How to Choose the Right Cloud DSPM Platform
    What is DSPM in Cyber Security and How to Choose the Right Cloud DSPM Platform

    Year after year, more data moves into the cloud. In fact, this year, over 200 zettabytes of data have landed in cloud storage repositories. The nature of that data hasn’t changed — Social Security numbers, cardholder information, intellectual property — but the surface area and accessibility have. Cloud storage’s inherent convenience introduces new risks: attack paths, misconfigurations, insider behavior, and compliance gaps. These challenges demand attention not just with tools, but with architectural clarity and operational readiness. This piece explains what DSPM is, why it matters at the data layer, and what to look for without the buzzwords. TL;DR DSPM discovers and classifies sensitive data in cloud storage, validates storage controls, monitors risky activity, and delivers audit-ready, actor–time–object evidence. Use DSPM alongside CSPM, CNAPP, and DLP to close the blind spot across Amazon S3, EBS, EFS, FSx, and similar services. When evaluating DSPM tools, prioritize coverage depth, in-tenant architecture, ML-based anomaly detection, evidence quality, and predictable pricing.

    Malware protection for Amazon Elastic File System with Cloud Storage Security inside an AWS account
    Proactive Malware Protection for Amazon EFS with Cloud Storage Security

    TL:DR Cloud Storage Security brings malware protection to Amazon EFS by scanning files in place inside your AWS account with multiple engines. You can schedule or run on demand scans, apply tag quarantine or delete actions, and stream findings to CloudWatch and your SIEM without moving data outside your environment.

    blog post card image
    CSS Founder Becomes 7th Person to Visit Challenger Deep and Surpass Kármán line

    October 13, 2025 - Aaron Newman, founder and CEO at Cloud Storage Security (CSS), has become the seventh person in history to visit both the maximum known depth on Planet Earth and the barrier to outer space.

    blog post card image
    Preventing Internal and External Data Breaches with DataDefender

    In the first half of 2025 Casmer Labs, Cloud Storage Security's internal threat research team, observed a steady increase in high impact data exposure and data theft incidents driven by insider activity, compromised access, and the lack of proactive activity monitoring.

    blog post card image
    Threat Report - July 2025

    Casmer Labs, Cloud Storage Security’s (CSS) internal threat laboratory, monitors the dynamic landscape of cybersecurity, cloud security, and particularly cloud data security. Our mission is to ensure that our customers and the public are informed about critical security developments, incidents, and updates.

    blog post card image
    Why the Lack of Cloud Monitoring Causes Data Breaches

    In the past 6 months, a number of high-profile data breaches, namely cryptocurrency exchange Coinbase, have resulted in the loss of millions of records and millions of dollars in fines, pipeline depletion, and restitution for the affected customers. In many ways, these data breaches are not the result of a lack of commitment to security by these companies, but are rather indicative of the evolving (and improving) tactics utilized by bad actors.

    blog post card image
    Employee Monitoring Application Exposes Millions of Screenshots

    As of late 2024, the public cloud is the technology of choice for organizations looking to build new applications and workflows. Accompanying this continuous migration to the cloud is the natural influx of data that are processed, stored, and transmitted by these applications. Furthering this problem is the fact that this already larger volume of data are being distributed over an ever-increasing number of storage repositories like Amazon S3 buckets, Azure Blobs, and Google Cloud Storage Containers.

    blog post card image
    Identifying and Preventing Insider Threats: Lessons From Coinbase

    Coinbase today reported that they had experienced a major cybersecurity incident- but not in the way you might have thought. This was not a data breach as most of the incidents in Q1 of 2025 have been, but instead was an internal threat where employees willingly exfiltrated data from Coinbase’s environment.

    blog post card image
    Week of 4/20 Threat Report

    Prior Week Threat Report - April 20, 2025

    angled bg image

    Tired of Reading?

    Want to watch something instead?

    watch video blog cta image 614x261