CSAIChaptersEventsBlog
Join the June 2 webinar to learn how AI-driven threats are reshaping enterprise security and what teams can do to stay ahead. Register now →

Announcements

Announcements
Don't fall into the trap of thinking you're safe and secure in the cloud. It could become a right royal pain in the SaaS
Don't fall into the trap of thinking you're safe and secure in the cloud. It could become a right royal pain in the SaaS

The Register

July 25, 2019

The Infosec Industry Comes Together to Recognize Innovators and Leaders at the First-Ever Cybersecurity Women of the Year Awards
The Infosec Industry Comes Together to Recognize Innovators and Leaders at the First-Ever Cybersecurity Women of the Year Awards

Dark Reading

July 25, 2019

SAFE-T; A Progressive Approach To Zero Trust Access
SAFE-T; A Progressive Approach To Zero Trust Access

Security Boulevard

July 23, 2019

Banking, AI and security - how to improve collaboration
Banking, AI and security - how to improve collaboration

SC Magazine UK

July 1, 2019

Women in Security: Women of Influence
Women in Security: Women of Influence

SC Magazine

July 1, 2019

Cloud Security Alliance releases new model to assist cloud computing risk assessment
Cloud Security Alliance releases new model to assist cloud computing risk assessment

Continuity Central

June 26, 2019

5 Cloud Security Concerns That Still Keep Cybersecurity Pros Up at Night
5 Cloud Security Concerns That Still Keep Cybersecurity Pros Up at Night

Security Boulevard

June 26, 2019

What are the top cloud security certifications for 2019?
What are the top cloud security certifications for 2019?

TechTarget

June 26, 2019

Here Is the Secret Behind Getting That Cloud Computing Job
Here Is the Secret Behind Getting That Cloud Computing Job

Analytics Insight

June 22, 2019

Software Defined Perimeter (SDP): The deployment
Software Defined Perimeter (SDP): The deployment

Network World

June 21, 2019

As cloud complexities increase, cybersecurity skills gap worsens
As cloud complexities increase, cybersecurity skills gap worsens

TechTarget

June 21, 2019

Saudi Arabia's NIC obtains star certification in cloud computing
Saudi Arabia's NIC obtains star certification in cloud computing

Saudi Gazette

June 20, 2019

How Federal Agencies Manage Their Risk in the Cloud
How Federal Agencies Manage Their Risk in the Cloud

FedTech Magazine

June 20, 2019

Who's Responsible for a Cloud Breach? It Depends
Who's Responsible for a Cloud Breach? It Depends

Security Boulevard

June 20, 2019

Cloud adoptions are obscuring data visibility, says new study
Cloud adoptions are obscuring data visibility, says new study

Digital Insurance

June 19, 2019

The Secret CSO: Nils Puhlmann, Twilio
The Secret CSO: Nils Puhlmann, Twilio

IDG Connect

June 13, 2019

Poor Cloud Security Practices Put Data at Risk; A Detailed Look at How Hackers Target Employees
Poor Cloud Security Practices Put Data at Risk; A Detailed Look at How Hackers Target Employees

Security Boulevard

June 12, 2019

Software Defined Perimeter (SDP): Creating a new network perimeter
Software Defined Perimeter (SDP): Creating a new network perimeter

Network World

June 12, 2019

The dirty dozen: 12 top cloud security threats
The dirty dozen: 12 top cloud security threats

CSO Online

June 11, 2019

7 Must-Have Cloud Security Certifications In 2019
7 Must-Have Cloud Security Certifications In 2019

CRN

June 11, 2019