ChaptersEventsBlog

All Articles

All Articles
DevSecOps Tools

Blog Published: 04/26/2024

Originally published by Dazz.Written by Noah Simon, Head of Product Marketing, Dazz.The goal of DevSecOps is to integrate security practices into the DevOps process. While much of the narrative of DevSecOps has been around writing ‘more secure code’, the narrative has expanded recently. Mature...

Five Reasons Why Ransomware Still Reigns

Blog Published: 04/29/2024

Originally published by CXO REvolutionaries.Written by Ben Corll, CISO in Residence, Zscaler.Ransomware – malicious software that encrypts data until a ransom is paid for its return or is leaked without its owner's consent – remains a persistent threat despite ongoing efforts to combat it. Eve...

Considerations When Including AI Implementations in Penetration Testing

Blog Published: 04/30/2024

Originally published by Schellman.Did you recently implement a new artificial intelligence (AI) feature within your application and now your customers are starting to ask for AI-specific penetration tests? Are you curious as to how an assessment like that would work? As with all these exercise...

How DSPM Can Help Solve Healthcare Cybersecurity Attacks

Blog Published: 04/30/2024

Originally published by Cyera.Healthcare organizations face rising cybersecurity threats looking to exfiltrate patient data. This article explores major healthcare data breaches, the value of stolen medical info, and how data security posture management (DSPM) solutions provide comprehensive d...

Defining Cloud Key Management: 7 Essential Terms

Blog Published: 05/01/2024

In the realm of cloud security, understanding key management is paramount to safeguarding sensitive data. Encryption, key generation, and access control help ensure that sensitive information remains unreadable and inaccessible to unauthorized parties. Without a thorough understanding of cloud...

CSA Community Spotlight: Educating the Security Industry with CISO Rick Doten

Blog Published: 05/08/2024

Can you believe that CSA has been defining and raising awareness of cloud security best practices for 15 years? Over the course of these several years, we’ve been educating the community with our volunteer-driven research publications, trainings, certificate programs, in-person and virtual e...

Cyber Defense Magazine Names Cloud Security Alliance’s Certificate of Competence in Zero Trust (CCZT) a 2024 Global InfoSec Award Winner for Cutting-Edge Cybersecurity Training

Press Release Published: 05/06/2024

CCZT helps security professionals build knowledge to drive the definition, implementation, and management of Zero TrustSAN FRANCISCO (RSA Conference) – May 6, 2024 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and best pr...

Navigating the Cloud – Beyond “Best Practices”

Blog Published: 05/01/2024

Originally published by Cloud Computing Consultants.Cloud migrations are complex. Rapidly evolving technology, team culture changes, and changing architectural requirements leave companies seeking options to alleviate their cloud migration paths. As a result, businesses are bombarded with a sl...

How Continuous Controls Monitoring Brings IT Unity & Agility

Blog Published: 05/10/2024

Originally published by RegScale.Written by Larry Whiteside Jr.Throughout my tenure as an operational CISO, there were countless moments when I yearned for things to unfold in a more streamlined manner. I had a clear vision for my team, which frequently grappled with being overburdened, unders...

5 Best Practices to Secure Your Azure Resources

Blog Published: 05/13/2024

Originally published by CrowdStrike.Cloud computing has become the backbone for modern businesses due to its scalability, flexibility and cost-efficiency. As organizations choose cloud service providers to power their technological transformations, they must also properly secure their cloud en...

Cloud Security Alliance Announces Additional Mappings Between Cloud Controls Matrix (CCM) and National Institute of Standards and Technology’s (NIST) Cybersecurity Framework (CSF)

Press Release Published: 05/08/2024

Mapping identifies misalignment and gaps between updated CCM and CSFRSA Conference (San Francisco) – May 8, 2024 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing env...

Cloud Security Alliance Releases Three Papers Offering Guidance for Successful Artificial Intelligence (AI) Implementation

Press Release Published: 05/06/2024

Report series charts course for responsible and secure development and deployment of AIRSA Conference (San Francisco) – May 6, 2024 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure ...

Cloud Security Alliance Paper Addresses Challenges of Implementing Zero Trust in Environments Where Artificial Intelligence (AI)-induced Shadow Access Is Prevalent

Press Release Published: 05/07/2024

Traditional Zero Trust approaches must adapt to the nuances of Generative AI (GenAI) technology to strengthen cybersecurityRSA Conference (San Francisco) – May 7, 2024 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and bes...

Microsoft Copilot for Security: Everything You Need to Know

Blog Published: 05/02/2024

Originally published by Reco.Written by Gal Nakash.What is Microsoft Copilot for Security?‍Microsoft Copilot for Security is an innovative component of the Microsoft security product portfolio. It is essentially engineered to redefine the management of security incidents. This solution is deep...

CISOs, AI, and OT: A Balancing Act Between Innovation and Protection

Blog Published: 05/03/2024

Originally published by CXO REvolutionaries.Written by Ben Corll, CISO in Residence, Zscaler.In early 2024, I had the privilege of teaching a SANS leadership course in New Orleans. The food was amazing, as expected. What I didn't expect was the sheer number of operational technology (OT) secur...

12 Strategic Career Tips for Aspiring CISOs

Blog Published: 05/06/2024

Originally published by Abnormal Security.Written by Mike Britton.In the ever-evolving world of cybersecurity, the role of Chief Information Security Officer (CISO) has been firmly established as a critical position. And while the journey to becoming a CISO can be challenging, the destination ...

Enterprise Management Associates Names Cloud Security Alliance as a Cutting-Edge Security Exhibitor in Its Vendor Vision 2024 Report for RSA

Press Release Published: 05/07/2024

CSA was the only nonprofit to be named in the reportSAN FRANCISCO (RSA Conference) – May 7, 2024 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment, is ple...

Zero Trust & Identity and Access Management: Mitigating Shadow Access

Blog Published: 05/10/2024

Written by the CSA Identity and Access Management Working Group.In today's digitally interconnected landscape, understanding the intricacies of Identity and Access Management (IAM) is imperative for safeguarding organizational assets. A looming threat to IAM is Shadow Access. This insidious me...

What is Management Plane (Metastructure) Security

Blog Published: 05/13/2024

Written by Ashwin Chaudhary, CEO, Accedere.Metastructure refers to the protocols and mechanisms that provide the interface between the infrastructure layer and the other layers. The glue that ties the technologies and enables management and configuration as per Cloud Security Alliance's Securi...

The Importance of Securing Your Organization Against Insider and Offboarding Risks

Blog Published: 05/14/2024

Written by Wing Security.Offboarding employees may seem like a routine administrative task, but the security risks it poses are anything but ordinary. In today's interconnected digital landscape, failing to properly revoke access for departing employees can lead to catastrophic data breaches, ...

Looking for the CCM?

Start using the Cloud Controls Matrix to simplify compliance with multiple standards & regulations.