ChaptersCircleEventsBlog
Get early access to CSA’s Trusted AI Safety Certification Program—updates, resources & beta invites!

All Articles

All Articles
7 Common Causes of Data Breach: Safeguarding Your Digital Assets

Blog Published: 04/18/2024

Originally published by InsiderSecurity.Data Breaches are an ever-present threat to enterprises in today’s connected world. Whether you are a small SME or a large multinational company, the risk of a data breach and the company becoming another headline is a constant concern for senior managem...

Cloud Security Alliance (CSA) AI Summit at RSAC to Deliver Critical Tools to Help Meet Rapidly Evolving Demands of AI

Press Release Published: 04/17/2024

Event to provide attendees with a holistic understanding of AI’s future along with pragmatic advice on managing risks and gaining benefits from generative AI SEATTLE – April 17, 2024 – This year, the Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standard...

Implementing a Data-Centric Approach to Security

Blog Published: 04/19/2024

Written by Uday Srinivasan, CTO, Acante.We previously discussed how the modern data stack has changed the threat landscape today. In part II, below, we outline exactly how security and data teams can enable modern data teams to innovate rapidly without compromising on the security and access g...

Are You Ready for Microsoft Copilot?

Blog Published: 04/19/2024

Originally published by Reco.Written by Gal Nakash.On March 14, Microsoft made Copilot available to customers in their 365 environment. Originally designed to enable productivity, Copilot is an AI chatbot that allows any user to conduct research or create content. It has the ability to generat...

What’s in a Name? Defining Zero Trust for Leaders

Blog Published: 04/22/2024

Originally published by CXO REvolutionaries.Written by Nat Smith, Senior Director, Product Management, Zscaler.Could you accurately and succinctly describe zero trust to your leadership team or board? During my five years as a VP analyst at Gartner, I witnessed executives struggle to convey th...

Understanding the Nuances: Privacy and Confidentiality

Blog Published: 04/22/2024

Originally published by MJD.Written by Shonda Knowles Elliott, CPA.In the digital age, where data is the new currency, businesses must prioritize the security and integrity of their clients' information. To demonstrate this, many organizations adhere to frameworks like SOC 2 (System and Organi...

Breach Debrief: The Fake Slackbot

Blog Published: 04/22/2024

Originally published by Adaptive Shield.Written by Hananel Livneh.Last month, The Verge reported on an amusing story of abusing Slack in a design, technology, science, and science fiction website. Tom McKay of IT Brew successfully hid on Slack after leaving the company in 2022 by assuming the ...

Upselling Cybersecurity: Why Baseline Security Features Shouldn’t Be a Commodity

Blog Published: 04/24/2024

Originally published by BARR Advisory. Written by Larry Kinkaid, Manager, Cybersecurity Consulting. When it comes to implementing and maintaining a strong cybersecurity posture within any organization, accountability is key. An information security program is only effective when controls—i.e.,...

Why Business Risk Should be Your Guiding North Star for Remediation

Blog Published: 04/25/2024

Originally published by Pentera.We all know the culprits. Cloud adoption, remote and hybrid work arrangements and a long list of must-have technologies have led to an ever-expanding attack surface, compelling organizations to become more agile and responsive in their cyber defense.Taming this ...

AI Hallucinations: The Emerging Market for Insuring Against Generative AI's Costly Blunders

Blog Published: 04/23/2024

Written by MJ Schwenger, Co-Chair of the CSA AI Governance and Compliance Working Group.Generative AI: Embracing Hallucinations for Responsible InnovationThis blog delves into the fascinating world of Generative AI (GenAI), acknowledging its revolutionary potential while addressing the inheren...

The Future of Cloud Cybersecurity

Blog Published: 04/29/2024

Written by Ashwin Chaudhary, CEO, Accedere.As we continue to embrace digital transformation, the future of cybersecurity in the cloud computing landscape is a topic of top importance. With an increasing number of businesses and individuals relying on cloud services, the need for robust and eff...

Your Ultimate Guide to Security Frameworks

Blog Published: 04/29/2024

Originally published by Vanta.Trust is a vital part of any growing business. A part of earning and keeping the trust of your customers is implementing the right security measures to protect their data and your systems from any breaches that could impact them. By aligning with industry-vetted s...

Livin' on the Edge: Linux's Impact on Computing

Blog Published: 05/01/2024

Originally published by Automox.SummaryThis episode of the CISO IT podcast explores the history and importance of Linux.Automox CISO Jason Kikta shares his personal experience with Linux and highlights its advantages and innovations. The conversation also touches on the changing attitudes towa...

Automation is Key: DHS Report Unveils Lessons from the Microsoft Exchange Incident

Blog Published: 05/02/2024

Originally published by Oasis Security.Written by Amit Zimerman, Co-founder & CPO, Oasis Security.Last week, the DHS Cyber Safety Review Board, established by President Biden, released a scathing report exposing critical oversights by Microsoft that enabled the targeted cyberattack by Chin...

Business Risks Explored: Practical Insights for Resilience

Blog Published: 05/03/2024

Written by the AuditCue Content Team. The COVID-19 pandemic serves as a prime example of external risks faced by companies, causing disruptions in supply chains, declines in demand, and government-mandated closures. However, some companies were able to adapt and innovate in response to the ...

Post-Quantum Preparedness

Blog Published: 05/03/2024

Written by Ascertia.The world of cryptography is on the cusp of a significant change. Quantum computers, once thought of as mere science fiction, are rapidly becoming a reality. While widespread availability of these powerful machines might not be imminent, their potential to break current cr...

Resource Constraints in Kubernetes and Security

Blog Published: 05/06/2024

A Practical GuideOriginally published by Sysdig.Written by Nigel Douglas.The Sysdig 2024 Cloud‑Native Security and Usage Report highlights the evolving threat landscape, but more importantly, as the adoption of cloud-native technologies such as container and Kubernetes continue to increase, no...

The Anatomy of an ALPHA SPIDER Attack

Blog Published: 05/06/2024

Originally published by CrowdStrike.ALPHA SPIDER is the adversary behind the development and operation of the Alphv ransomware as a service (RaaS).Over the last year, ALPHA SPIDER affiliates have been leveraging a variety of novel techniques as part of their ransomware operations.CrowdStrike S...

Is Managed Kubernetes the Right Choice for My Organization?

Blog Published: 05/07/2024

Originally published by Tenable. Written by Mark Beblow. Many enterprises have adopted container technology because it helps them to streamline the building, testing and deploying of applications. The benefits of container technology include better resource efficiency, portability, consisten...

Navigating Legacy Infrastructure: A CISO’s Strategy for Success

Blog Published: 05/08/2024

Originally published by Pentera.Every company has some level of tech debt. Unless you’re a brand new start-up, you most likely have a patchwork of solutions that have been implemented throughout the years, often under various leadership teams with different priorities and goals. As those tech...

Looking for the CCM?

Start using the Cloud Controls Matrix to simplify compliance with multiple standards & regulations.