Empowering Snowflake Users Securely
Blog Published: 11/01/2024
Originally published by Normalyze.Written by Joe Gregory.Two security leaders address data sprawl, user access, compliance, and scaleI recently moderated a webinar titled Unlocking the Power of Snowflake about the top challenges organizations face today: how to maximize their Snowflake investment...
Zero Standing Privileges: The Essentials
Blog Published: 11/01/2024
Originally published by CyberArk.Written by Josh Kirkwood.In December, I’ll have been with CyberArk for seven years, and at a similar point, I’ll have spent two years leading product marketing for cloud security at the company. In my short tenure with CyberArk Product Marketing, I’ve advocated fo...
Identity Breaches in 2024 – An Ounce of Hygiene is Worth a Pound of Technology
Blog Published: 11/01/2024
Originally published by Pentera.Identity is a key to open a doorWho are you? Yes, you reading. Who are you?There’s probably a lot of ways you can answer that question, and that is because there are a lot of attributes that make up your identity. Let’s keep things simple because that’s what’s easy...
The EU Cloud Code of Conduct: Apply GDPR Compliance Regulations to the Cloud
Blog Published: 10/31/2024
The CSA Security Update podcast is hosted by John DiMaria, Director of Operations Excellence at CSA. The podcast explores the CSA STAR program, cloud security best practices, and associated technologies. In this blog series, we edit key podcast episodes into shorter Q&As. Today’s post expl...
How to Get your Cyber Essentials Certification: A Process Guide
Blog Published: 10/31/2024
Originally published Vanta.Most organizations today are heavily reliant on technology, regardless of the product or service they provide. This expands their data exposure points and potential attack surface, which is why there is a significant need to monitor the risks and vulnerabilities in the ...
Tackling Ransomware Head-On: A Business’s Guide to Understanding and Defense
Blog Published: 10/31/2024
Originally published by Richey May.In today’s cybersecurity landscape, threats are more than just a cautionary tale—they’re a daily reality, and ransomware tops the list of concerns. This aggressive form of cyberattack can grind operations to a halt and compromise sensitive data. Keep reading, we...
Top IAM Priorities for 2025: Addressing Multi-Cloud Identity Management Challenges
Blog Published: 10/30/2024
As we move toward 2025, the adoption of multi-cloud and hybrid cloud is continuing to accelerate. While the benefits are manifold, it also means that organizations have significant challenges when securely integrating hybrid and cloud identity systems.Just some of these challenges identity and ac...
The Hidden Power of Zero Trust Thinking
Blog Published: 10/30/2024
Written by Mark Fishburn and originally published on his website.1. Daytime Stress and Sleepless Nights Managing cybersecurity, networks, workloads, and websites can be stressful, especially when many things go bump simultaneously in the middle of the night. During calmer daytime moments, we r...
According to Cloud Security Alliance Survey More than Half of Organizations Cite Technical Debt as Top Hurdle to Identity System Modernization
Press Release Published: 10/30/2024
Report also found that over 75% of enterprises are using two or more IDPs and struggle to manage access controls and consistent security policiesSEATTLE – Oct. 30, 2024 – Modernizing identity systems is proving difficult for organizations due to two key challenges: decades of accumulated Identity...
How to Assess and Treat AI Risks and Impacts with ISO/IEC 42001:2023
Blog Published: 10/30/2024
Originally published by Schellman.ISO/IEC 42001:2023 is rapidly becoming the global standard for Artificial Intelligence (AI) governance. While it is a close cousin of ISO/IEC 27001:2022, ISO 42001—rather than focusing primarily on cyber and information security—takes a more holistic approach to ...
Streamlining Cloud Security: Integrating CSA CCM Controls into Your ISO/IEC 27001 Framework
Blog Published: 10/29/2024
In today’s rapidly evolving security landscape, it can be overwhelming to manage multiple frameworks, especially for organizations striving for excellence in cloud security. The CSA Cloud Controls Matrix (CCM) is a gold standard in cloud security governance, providing a detailed map of best pract...
New Paper from Cloud Security Alliance Examines Considerations and Application of Zero Trust Principles for Critical Infrastructure
Press Release Published: 10/29/2024
Paper bridges gap between traditional information technology security methodologies and the unique demands of critical infrastructure sectorsSEATTLE – Oct. 29, 2024 – In today's interconnected world, critical infrastructure (CI) sectors face an ever-evolving landscape of cyber and physical threat...
Elevating Security Standards with AI Cloud Security Compliance Tools
Blog Published: 10/28/2024
Written by Ashwin Chaudhary, CEO, Accedere.Organizations are quickly moving to cloud environment in today's digital landscape due to it’s potential for cost savings, scalability, and flexibility. But this change also brings a complicated new set of compliance and security issues. Here are AI clou...
Democracy at Risk: How AI is Used to Manipulate Election Campaigns
Blog Published: 10/28/2024
From spreading disinformation to facilitating voter manipulation, AI can be used for unethical election practicesOriginally published by Enkrypt AI.Written by Satbir Singh, Product Manager and Engineer, Enkrypt AI.It's election season in the United States once again. As political candidates ramp ...
Are Companies Becoming More Transparent About Cyber Incidents?
Blog Published: 10/28/2024
Originally published by CXO REvolutionaries.Written by Nat Smith, Sr. Director, Product Management, Zscaler.Not long ago, companies were hesitant to disclose cyber incidents, fearing a backlash and damage to their reputations, and a loss of customer trust. In 2017, Equifax waited six weeks to dis...
How CSA Research Uses the Cloud Controls Matrix to Address Diverse Security Challenges
Blog Published: 10/25/2024
CSA extensively leverages the Cloud Controls Matrix (CCM) to enhance security practices across various domains of cloud research. The CCM is a comprehensive cloud security framework consisting of 197 security control objectives. The main purpose of the framework is to help organizations address t...
Unpacking the Cloud Security Best Practices from CISA and the NSA
Blog Published: 10/25/2024
Originally published by Tenable. Written by Zan Liffick. Recent cloud security guidance from CISA and the NSA offers a wealth of recommendations to help organizations reduce risk. This blog highlights key takeaways, provides further insights from CIS, and explores how utilizing cloud securi...
Elevating Alert Readiness: A People-First Approach for CISOs
Blog Published: 10/25/2024
Originally published by Devoteam.The Gartner Security & Risk Management Summit 2024 hammered home the need for a proactive and resilient approach to cybersecurity. Sure, there were plenty of shiny new technologies and strategies on display, but the biggest takeaway for me was the resounding e...
The CSA Triangle Chapter’s Year of Growth and Collaboration: 2023-2024 Highlights
Blog Published: 10/24/2024
Over the past year, under the leadership of Co-founder & President Shankar Chebrolu, the CSA Triangle Chapter has played a pivotal role in advancing cloud security education, building partnerships with local chapters and leading academic institutions, and fostering community engagement. The t...
Shadow AI Prevention: Safeguarding Your Organization’s AI Landscape
Blog Published: 10/24/2024
Written by CSA's AI Organizational Responsibility Working Group.In today’s rapidly evolving technological landscape, the rise of Shadow AI poses a significant challenge to organizations. Shadow AI refers to unauthorized or undocumented AI systems within an organization, which can compromise secur...