ChaptersEventsBlog
Register for DataSecAI 2025 in Dallas – Protect Data, Secure AI, and Drive Innovation

Announcements

Announcements
Membership Makeover: Lessons in Evolving a Membership Model From the MPA’s Trusted Partner Network
Membership Makeover: Lessons in Evolving a Membership Model From the MPA’s Trusted Partner Network

Associations Now

November 21, 2022

How training and continuing education are crucial for healthcare cybersecurity leaders and staff
How training and continuing education are crucial for healthcare cybersecurity leaders and staff

HealthcareITNews

November 16, 2022

Many Cloud Attacks End in Financial Loss for Healthcare Sector
Many Cloud Attacks End in Financial Loss for Healthcare Sector

HealthIT Security

November 15, 2022

5 Multi-cloud Security Challenges You Can Avoid
5 Multi-cloud Security Challenges You Can Avoid

ITPro Today

November 14, 2022

How to Build a Successful Cloud Security Strategy
How to Build a Successful Cloud Security Strategy

Security Boulevard

November 10, 2022

Manual Vs. SSPM: Streamlining SaaS Security Management
Manual Vs. SSPM: Streamlining SaaS Security Management

Security Boulevard

November 10, 2022

Can confidential computing stop the next crypto heist?
Can confidential computing stop the next crypto heist?

The Register

November 7, 2022

Cloud data security – challenges and priorities for organization
Cloud data security – challenges and priorities for organization

Daily Host News

November 7, 2022

A SECtember Refrain: CxOs Need Help Educating Their Boards
A SECtember Refrain: CxOs Need Help Educating Their Boards

November 1, 2022

Israel Cyber Directorate, Cloud Security Alliance sign MoU
Israel Cyber Directorate, Cloud Security Alliance sign MoU

Israel Defense

October 31, 2022

Welcoming bugbusters
Welcoming bugbusters

Economic Times

October 30, 2022

Thank AI for the New Enterprise IT Solution for Global Healthcare Operations
Thank AI for the New Enterprise IT Solution for Global Healthcare Operations

HIT Consultant

October 28, 2022

The top cloud cyber security threats unpacked
The top cloud cyber security threats unpacked

The Register

October 28, 2022

Retaining Customer Control in a Multi-Cloud Environment
Retaining Customer Control in a Multi-Cloud Environment

Security Boulevard

October 26, 2022

Why you’re getting cloud security wrong
Why you’re getting cloud security wrong

InfoWorld

October 25, 2022

What Any Executive Needs to Know About Zero Trust
What Any Executive Needs to Know About Zero Trust

October 24, 2022

More Work Needed to Secure Data in the Cloud, Survey Finds
More Work Needed to Secure Data in the Cloud, Survey Finds

GovTech

October 24, 2022

Adopting Zero Trust: Six Key Priorities
Adopting Zero Trust: Six Key Priorities

Forbes

October 21, 2022

New Study from Cloud Security Alliance and BigID Finds That Organizations Are Struggling to Track, Secure Sensitive Data in the Cloud
New Study from Cloud Security Alliance and BigID Finds That Organizations Are Struggling to Track, Secure Sensitive Data in the Cloud

Cyber News

October 20, 2022

96% of companies report insufficient security for sensitive cloud data
96% of companies report insufficient security for sensitive cloud data

CSO Online

October 20, 2022