ChaptersCircleEventsBlog
Get early access to CSA’s Trusted AI Safety Certification Program—updates, resources & beta invites!

All Articles

All Articles
Highlights from the 2023 Cloud Threat Report

Blog Published: 07/24/2023

Originally published by Aqua Security. Written by Chris Simmons, Senior Director Product Marketing, Aqua Security. The adoption of cloud native technologies has become a cornerstone to helping business build and run applications. Cloud computing has revolutionized the way organizations design,...

Protecting PII in the Cloud

Blog Published: 07/25/2023

Written by Ashwin Chaudhary, CEO, Accedere. Cloud computing has revolutionized the way businesses operate, providing flexibility, scalability, and cost savings. PII (Personal Identifiable Information) refers to any data that can be used to identify a specific individual. PII is often sensit...

Multi-Cloud vs. Hybrid Cloud: Choosing the Right Cloud

Blog Published: 07/26/2023

Originally published by Sangfor. Written by Nicholas Tay Chee Seng, CTO, Sangfor Cloud. Today’s digitally dominated economy has transformed the global landscape. Efficient and cost-effective IT infrastructure, namely cloud computing, is critical to providing organizations with the competitive ...

Four Ways to Quickly Determine Your Atomization Issue and Next Steps to Fix it

Blog Published: 07/27/2023

Originally published by Netography. Written by Martin Roesch, CEO, Netography. Network atomization didn’t happen overnight. It’s been a progression over the last fifteen-plus years driven by digital transformation, a rise in multi-cloud strategies, and the shift to a hybrid workforce. And now,...

The Consequences of Expired Payment Info

Blog Published: 09/28/2023

Originally published by TokenEx. Written by Valerie Hare. Ecommerce businesses lose $18 billion in sales revenue every year due to cart abandonment. 30 percent of shoppers will abandon their cart if they have to re-enter their credit card details. Since most credit cards expire after three to...

Stopping Phishing Attacks and Socially-Engineered Threats from ChatGPT

Blog Published: 08/01/2023

Originally published by Abnormal Security. Written by Jade Hill. What’s the difference between a tool and a weapon? It’s all about intent. What someone uses for creative purposes can also be used for malicious purposes.Consider generative AI, which includes popular technologies like ChatGPT an...

Meeting and Scaling Compliance with Intentional IaC Design

Blog Published: 08/03/2023

Originally published by Coalfire. Written by Christian Stano, Senior Consultant, Cloud Services, Coalfire.Key takeaways Utilizing consolidated, “smart” compliance-aware Terraform module design decreases audit risk and cost and maintains or accelerates developer velocity by shifting the burden ...

Last Mile Enforcement: Securing Those Unmanageable Non-Standards-Based Applications

Blog Published: 07/27/2023

Originally published by Strata.Is it possible to have modern authentication for both standards-based and non-standards-based apps? In today’s rapidly-evolving business environment, enterprise applications are crucial for driving innovation and productivity. From an identity standpoint, they ar...

Dissecting Cloud Ransomware: Lessons Learned and How to be Prepared

Blog Published: 08/04/2023

Originally published by Dig Security. Written by Sharon Farber. Our most recent webinar, “Dissecting Cloud Ransomware: Lessons learned and how to be prepared?” saw Yotam Ben Ezra (Chief Product Officer) and Ofir Balassiano (Head of Security Research) engaging in an in-depth exploration of all ...

Cloud Vulnerability Management Program

Blog Published: 07/28/2023

Written by Kazi Arif, Senior Consultant, AT&T Cybersecurity. Continuous technological advancements introduce critical vulnerabilities to your organization that malicious actors seek to exploit. Despite considerable time, money, and resources invested into security, achieving 100% protectio...

Compromised Accounts Are Being Weaponized – Here’s How to Fight Back

Blog Published: 07/31/2023

Originally published by Code42. Written by Christian Wimpelmann. Compromised user accounts have always been the most significant — and simplest — cybersecurity risk in the enterprise. Stolen credentials were the vector of choice for more than 40% of attacks in 2022, according to Verizon’s 2022...

Building Business Trust in the Dark Forest of the Internet

Blog Published: 07/21/2023

Originally published by CXO REvolutionaries. Written by Sam Curry, VP & CISO, Zscaler. “The universe is a dark forest. Every civilization is an armed hunter stalking through the trees like a ghost, gently pushing aside branches that block the path and trying to tread without sound.” - Cixi...

New Research: Life Sciences Organizations are Ahead of the Curve, but Vulnerabilities Persist

Blog Published: 07/21/2023

Originally published by Code42. Written by Clea Ostendorf. From HIPAA regulations, to lost business opportunities, to stolen IP and trade secrets, organizations in the Life Sciences sector stand to lose a great deal to Insider Risk. Though all sectors are faced with the threat of data loss fro...

Microsoft Executive Shawn Bice to Discuss the Intersection of AI, Cloud, and Cybersecurity at Cloud Security Alliance’s SECtember 2023

Press Release Published: 07/25/2023

Industry veteran will hold a keynote fireside chat on the widespread integration of Generative AI within cloud security solutions and what the future may bringSEATTLE – July 25, 2023 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certific...

Hospitals and Ransomware: The Human Cost of Weak Cybersecurity

Blog Published: 07/24/2023

Originally published by NCC Group.Written by Sourya Biswas, Technical Director, NCC Group.While data breaches have been the most prominent consequence of cyber attacks in the last decade, ransomware attacks have been fast catching up. And if you’ve been following the news around ransomware, yo...

CSA’s Enterprise Architecture: Security and Risk Management (SRM)

Blog Published: 07/22/2023

Written by CSA’s Enterprise Architecture Working Group. The Enterprise Architecture is both a methodology and a set of tools that enable security architects, enterprise architects, and risk management professionals to leverage a common set of solutions and controls. It can be used to assess op...

Navigating Cloud Security Challenges: Key Concerns for Cybersecurity Professionals

Blog Published: 07/25/2023

Written by Scott Caveza, Tenable. As organizations expand their use of public cloud and adopt a cloud-first strategy, cybersecurity teams encounter mounting complexity and new forms of risk. Cloud service providers (CSPs) often apply patches silently and fix misconfigurations without any notic...

Maximizing ROI on Cybersecurity Training

Blog Published: 07/25/2023

Originally published by Coalfire. With many organizations facing understaffed IT and security departments with limited time and budget, it's smart to ask, "How do the benefits of security awareness training outweigh the costs?"Key Takeaways:Traditional training for compliance is ineffective fo...

Around the Horn with a Cybersecurity Summer

Blog Published: 07/25/2023

Like many of you I presume, summer is my favorite time of the year. Where I live, the weather is perfect and life seems to be an endless parade of beaches, cookouts, and baseball. The challenge is to stay focused on work. For this update, I decided to cheat a bit, leverage some baseball nomenc...

Building a Data Management Plan

Blog Published: 07/26/2023

Originally published by BARR Advisory. Written by Christine Falk. Building and operating a data management plan can be time consuming and overwhelming. You don’t have to go it alone. BARR Advisory asked Dariek Howard, manager, Attest Services, to share his thoughts and recommendations for buil...

Looking for the CCM?

Start using the Cloud Controls Matrix to simplify compliance with multiple standards & regulations.