AI introduces new security risks. Explore the pitfalls of AI adoption across digital infrastructures and how to detect and ...
Founded in 2013 by the Cloud Security Alliance, the Security Trust Assurance and Risk (STAR) registry encompasses key principles of transparency, rigorous auditing, and cloud security and privacy best ...
Gain expertise in Zero Trust with CSA’s Certificate of Competence in Zero Trust (CCZT). Elevate your security skills and advance your career. Uncover key trends and strategies to conquer multi-cloud ...
CSA’s Cloud Controls Matrix is a gold standard in cloud security. However, if you already adhere to ISO 27001, just focus on ...
CSA’s latest survey report provides a look at the current state of identity architecture and identity governance. Get a ...
Recent cloud security guidance from CISA and the NSA offers a wealth of recommendations to help organizations reduce risk. This blog highlights key takeaways, provides further insights from CIS, and ...
Written by CSA’s Top Threats Working Group. In this blog series, we cover the key security challenges from CSA's Top Threats to Cloud Computing 2024. Drawing from the insights of over 500 experts, ...
SEATTLE – Oct. 29, 2024 – In today's interconnected world, critical infrastructure (CI) sectors face an ever-evolving landscape of cyber and physical threats. As these sectors embrace digital ...
Originally published by Richey May. In today’s cybersecurity landscape, threats are more than just a cautionary tale—they’re a daily reality, and ransomware tops the list of concerns. This aggressive ...
Written by Itzik Alvas, Entro Security. Cyber threats are evolving rapidly. Organizations must navigate the delicate balance between robust security measures and cost-efficiency. One critical aspect ...
According to Cloud Security Alliance Survey More than Half of Organizations Cite Technical Debt as Top Hurdle to Identity System Modernization According to Cloud Security Alliance Survey More than ...