CSA’s Cloud Controls Matrix is a gold standard in cloud security. However, if you already adhere to ISO 27001, just focus on ...
Learn how the CSA Research Team uses the Cloud Controls Matrix (CCM) in various domains of cloud research, including top ...
Highly convincing AI text, images, and videos have raised concerns about AI’s use in elections - from spreading ...
CSA’s latest survey report provides a look at the current state of identity architecture and identity governance. Get a ...
Cybersecurity disclosures are shifting toward transparency. SEC rules and China's Cybersecurity Law push companies to ...
AI cloud security compliance technologies are cutting-edge fixes made to assist companies in maintaining strong security ...
The CSA Security Update podcast is hosted by John DiMaria, Director of Operations Excellence at CSA. The podcast explores the CSA STAR program, cloud security best practices, and associated ...
SEATTLE – Oct. 29, 2024 – In today's interconnected world, critical infrastructure (CI) sectors face an ever-evolving landscape of cyber and physical threats. As these sectors embrace digital ...
Recent cloud security guidance from CISA and the NSA offers a wealth of recommendations to help organizations reduce risk. This blog highlights key takeaways, provides further insights from CIS, and ...
According to Cloud Security Alliance Survey More than Half of Organizations Cite Technical Debt as Top Hurdle to Identity System Modernization According to Cloud Security Alliance Survey More than ...
Written by Justin Blackburn, Sr. Cloud Threat Detection Engineer, AppOmni. In our recent post on session hijacking, we examined how sessions work and discussed how sessions can be compromised. We also ...