ChaptersEventsBlog
Join global cybersecurity leaders shaping the future of AI security! Share your insights on AI Safety in this Deloitte executive survey

Announcements

Announcements
Introducing Third-Party Access Control: Protecting Cloud Resources Like Never Before
Introducing Third-Party Access Control: Protecting Cloud Resources Like Never Before

Security Boulevard

November 19, 2024

Map the Transaction Flows for Zero Trust
Map the Transaction Flows for Zero Trust

November 19, 2024

https://securityboulevard.com/2024/11/cybersecurity-snapshot-five-eyes-rank-2023s-most-frequently-exploited-cves-while-csa-publishes-framework-for-ai-system-audits/
https://securityboulevard.com/2024/11/cybersecurity-snapshot-five-eyes-rank-2023s-most-frequently-exploited-cves-while-csa-publishes-framework-for-ai-system-audits/

Security Boulevard

November 15, 2024

How resilient is your organisation against a cyberattack?
How resilient is your organisation against a cyberattack?

IT-Online

November 14, 2024

CSTF, DeRusha Look to Achieve Reciprocity in Cloud Security
CSTF, DeRusha Look to Achieve Reciprocity in Cloud Security

MeriTalk

November 14, 2024

Cloud Security Alliance issues comprehensive guidelines for auditing AI systems
Cloud Security Alliance issues comprehensive guidelines for auditing AI systems

Security InfoWatch

November 14, 2024

Exploring the Power of AI in Software Development - Part 12: More Recommendations
Exploring the Power of AI in Software Development - Part 12: More Recommendations

DevOps Digest

November 13, 2024

Using Asymmetric Cryptography to Help Achieve Zero Trust Objectives
Using Asymmetric Cryptography to Help Achieve Zero Trust Objectives

November 13, 2024

6 cloud migration challenges to prepare for and overcome
6 cloud migration challenges to prepare for and overcome

Tech Target

November 8, 2024

Exploring the Power of AI in Software Development - Part 9: Workforce
Exploring the Power of AI in Software Development - Part 9: Workforce

DevOps Digest

November 7, 2024

Cloud Security Alliance Examines Considerations and Application of Zero Trust Principles for Critical Infrastructure
Cloud Security Alliance Examines Considerations and Application of Zero Trust Principles for Critical Infrastructure

ARC Advisory Group

November 7, 2024

Security associations CISOs should know about
Security associations CISOs should know about

CSO

November 6, 2024

As AI Advances, So Do Cyber Threats on Commerce
As AI Advances, So Do Cyber Threats on Commerce

PYMNTS

November 6, 2024

Cybersecurity Snapshot: Apply Zero Trust to Critical Infrastructure’s OT/ICS, CSA Advises, as Five Eyes Spotlight Tech Startups’ Security
Cybersecurity Snapshot: Apply Zero Trust to Critical Infrastructure’s OT/ICS, CSA Advises, as Five Eyes Spotlight Tech Startups’ Security

Tenable

November 6, 2024

CSA advances zero trust for critical infrastructure
CSA advances zero trust for critical infrastructure

SC Magazine

November 5, 2024

Technical debt, multi-cloud complexity hinder modern tech adoption
Technical debt, multi-cloud complexity hinder modern tech adoption

SC Magazine

November 5, 2024

Google Uses Its Big Sleep AI Agent to Find SQLite Security Flaw
Google Uses Its Big Sleep AI Agent to Find SQLite Security Flaw

Security Boulevard

November 5, 2024

Exploring the Power of AI in Software Development - Part 7: Maturity
Exploring the Power of AI in Software Development - Part 7: Maturity

DevOps Digest

November 5, 2024

Dispelling the ‘Straight Line’ Myth of Zero Trust Transformation
Dispelling the ‘Straight Line’ Myth of Zero Trust Transformation

November 4, 2024

Exploring the Power of AI in Software Development - Part 6: Security Challenges
Exploring the Power of AI in Software Development - Part 6: Security Challenges

DevOps Digest

November 4, 2024