AI-Powered Cybersecurity: Safeguarding the Media Industry
Blog Published: 11/20/2024
Written by Satyavathi Divadari, Founder and President of the CSA Bangalore Chapter, in collaboration with the AI Technology and Risk Working Group.In the fast-paced world of media, where delivering authentic news quickly is essential, cybersecurity plays a critical role in protecting data, ensuri...
The Lost Art of Visibility, in the World of Clouds
Blog Published: 11/20/2024
Written by Vito Nozza, Softchoice.“The power of visibility can never be underestimated” Margaret ChoAs many of you have read my past blogs, I like to quote individuals who have had experience in certain subjects. Although the above quote was meant for a different context, it bears true for this c...
Cloud Security Alliance Announces Winners of the 2024 Juanita Koilpillai Awards
Press Release Published: 11/20/2024
Award honors volunteers for their valuable contributions towards fulfilling CSA’s mission of promoting best practices to help ensure a secure cloud computing environmentSEATTLE – Nov. 20, 2024 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising ...
5 Big Cybersecurity Laws You Need to Know About Ahead of 2025
Blog Published: 11/20/2024
Originally published by Schellman.Written by Jordan Hicks.Generally, with new cybersecurity regulations, organizations affected are provided a “grace period” to make the necessary adjustments to achieve full compliance before enforcement begins. Looking toward the horizon and 2025, many new laws ...
Why Application-Specific Passwords are a Security Risk in Google Workspace
Blog Published: 11/19/2024
Originally published by Valence.Written by Jason Silberman.The digital world is constantly changing, and with it, the methods used to secure sensitive information. Decisions made years ago continue to shape today’s landscape. The inception of Gmail by Google marked a pivotal moment in history, se...
Managing AI Risk: Three Essential Frameworks to Secure Your AI Systems
Blog Published: 11/19/2024
Originally published by BARR Advisory.Artificial intelligence (AI) is transforming the way businesses operate across industries, driving advancements in automation, decision-making, and customer experiences. From healthcare to finance, AI has unlocked new opportunities for efficiency and innovati...
CSA Community Spotlight: Addressing Emerging Security Challenges with CISO Pete Chronis
Blog Published: 11/18/2024
As the Cloud Security Alliance (CSA) celebrates its 15th anniversary, we reflect on the pivotal role CSA volunteers and contributors have played in shaping the future of cloud security. Founded in 2009, CSA quickly established itself as an instrumental leader in the cloud security space, dedicate...
Top Threat #5 - Third Party Tango: Dancing Around Insecure Resources
Blog Published: 11/18/2024
Written by CSA’s Top Threats Working Group.In this blog series, we cover the key security challenges from CSA's Top Threats to Cloud Computing 2024. Drawing from insights of over 500 experts, we'll discuss the 11 top cybersecurity threats, their business impact, and how to tackle them. Whether yo...
Group-Based Permissions and IGA Shortcomings in the Cloud
Blog Published: 11/18/2024
Originally published by Britive.Groups make it easier to assign permissions to multiple users at once, reducing the administrative burden and shortening delays on getting appropriate levels of access. Traditional identity governance and administration (IGA) solutions have been pivotal in managing...
9 Tips to Simplify and Improve Unstructured Data Security
Blog Published: 11/18/2024
Originally published by Normalyze.Written by Vamsi Koduru.Data security specialists know the challenges of storing, managing, and securing unstructured data. Due to the sheer volume and variety of unstructured data, its searchability and data quality challenges, and the overarching issues of secu...
How AI Changes End-User Experience Optimization and Can Reinvent IT
Blog Published: 11/15/2024
Originally published by CXO Revolutionaries.Written by Christopher Jablonski, Director, CXO REvolutionaries & Community.Improving the user experience is a top priority as businesses adapt to hybrid work, increase usage of SaaS applications, and new business demands. Everyone — employees, part...
Zero Standing Privileges (ZSP): Vendor Myths vs. Reality
Blog Published: 11/15/2024
Originally published by CyberArk.Written by Sam Flaster.Several new vendors entering the privileged access management (PAM) market are boldly claiming they can – or will soon be able to – provide access with zero standing privileges (ZSP).In reality, these lofty vendor claims likely ignore the li...
The Rocky Path of Managing AI Security Risks in IT Infrastructure
Blog Published: 11/15/2024
Written by David Balaban.Today, most people associate artificial intelligence (AI) with its generative facet manifested through services that create images, text, videos, and software code based on human input. While that’s arguably the most popular option among end-users, AI shows a lot of promi...
6 Top Benefits of Managed Cloud Security
Blog Published: 11/14/2024
Originally published by Tamnoon.As businesses continue migrating to the cloud and expanding their cloud footprint, scaling remediation of misconfigurations and reducing cloud threat exposure becomes a continuous battle for SecOps teams. Managed cloud security services offer the much-needed soluti...
Cloud Security Alliance Issues Comprehensive Guidelines for Auditing Artificial Intelligence (AI) Systems, Beyond Compliance
Press Release Published: 11/14/2024
Paper presents a holistic overview and applicable methodology for impartially assessing intelligent systemsSEATTLE – Nov. 14, 2024 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure clou...
Non-Human Identity Management Program: Guide Step-by-Step
Blog Published: 11/14/2024
Originally published by Oasis Security.Written by Marta Dern.We’ve covered the ins and outs of Non-Human Identity (NHI) Management—what it is, why it matters, and the best practices for handling these digital identities. But how do you translate theory into action? What does the deployment of an ...
What Do the New NIST Password Guidelines Mean for Cloud Security?
Blog Published: 11/13/2024
Originally published by Skyhawk Security.Written by Jennifer Gill.The common joke around security folks is that everyone knows what a password is, but not many remember their own passwords. But even so- passwords are an essential security mechanism and now, NIST is updating its recommendations re...
5 Best Practices for Executive Reporting
Blog Published: 11/13/2024
Originally published by Vanta.Written by Toni Ng.In today's complex business landscape, effective executive reporting is not just about sharing information; it's about using the insights to take action and demonstrating the value of your compliance and security efforts. This blog outlines five es...
What is Cloud Workload in Cloud Computing?
Blog Published: 11/13/2024
Written by Ashwin Chaudhary, CEO, Accedere.Cloud workload refers to the various tasks, applications, services, and processes run in cloud computing environments. Cloud workloads allow for scalability, flexibility, and efficiency, enabling businesses and individuals to access and run applications ...
ConfusedPilot: UT Austin & Symmetry Systems Uncover Novel Attack on RAG-based AI Systems
Blog Published: 11/12/2024
Originally published by Symmetry Systems.Written by Claude Mandy.Executive SummaryResearchers at the Spark Research Lab (University of Texas at Austin)[1], under the supervision of Symmetry CEO Professor Mohit Tiwari uncovered a novel attack method, dubbed ConfusedPilot. This novel attack method ...