Cloud 101CircleEventsBlog
Discover the latest cloud threats, evolving AI risks, and how to stay ahead. Don’t miss CSA’s free Cloud Threats & Vulnerabilities Summitregister now!

All Articles

All Articles
EU AI Act Introduces Unique Tiered System for Risks

Blog Published: 06/20/2024

Originally published by Truyo.With the full text of the EU AI Act made public, Truyo President Dan Clarke read through the Act in its entirety to identify key elements that will be crucial to compliance for organizations in scope. The Act includes the conventional components of transparency, p...

CSPM vs ASPM – What’s the Difference?

Blog Published: 06/24/2024

Written by Josh Dreyfus, Director of Product Marketing, ArmorCode.The software security space moves fast, and new acronyms pop up like weeds. Many of them sound similar, even if they do very different things. Take CSPM (Cloud Security Posture Management) and ASPM (Application Security Posture ...

SEC Clarifies Rules on Disclosure of Cybersecurity Incidents: Here’s What You Need to Know

Blog Published: 06/25/2024

Originally published by BARR Advisory.The Securities and Exchange Commission (SEC) recently published updated guidance for public companies on how and when to disclose cybersecurity incidents.Issued as a follow-up to new rules adopted by the commission last year, the updated guidance is intend...

AI is Now Exploiting Known Vulnerabilities - And What You Can Do About It

Blog Published: 06/26/2024

Originally published by Dazz.In a recent study from the University of Illinois Urbana-Champaign (UIUC), researchers demonstrated the ability for Language Learning Models (LLMs) to exploit vulnerabilities simply by reading threat advisories. While some are arguing that the sample size was rathe...

Do SOC 2 and ISO 27001 the Right Way with CSA STAR

Blog Published: 06/21/2024

At the CSA Cloud Trust Summit 2024, CSA’s CEO Jim Reavis gave the presentation “Do SOC 2 and ISO 27001 the right way with CSA STAR.” In this condensed transcript of the presentation, Jim provides an overview of the SOC 2 and ISO 27001 frameworks and how they relate to the CSA STAR program. You...

9 Best Practices for Preventing Credential Stuffing Attacks

Blog Published: 06/26/2024

Written by StrongDM.Online accounts are repositories of sensitive personal information, making it crucial to protect this data from cybercriminals. As credential stuffing attacks become more frequent, it's essential to stay one step ahead of attackers to ensure the security of your employees' ...

AI Data Considerations and How ISO 42001—and ISO 9001—Can Help

Blog Published: 06/28/2024

Originally published by Schellman.While the rapid pace at which artificial intelligence (AI) technology has been both developing and impacting several areas of our daily lives continues, so too do the concerns about the tech’s safety, privacy, and bias. As there’s no stopping the ongoing integ...

Building Security Around Human Vulnerabilities

Blog Published: 06/25/2024

Written by Benjamin Corll, CISO in Residence, Zscaler.Why are organizations spending money on cybersecurity solutions when studies show 88% of data breaches are caused by human mistakes? If you’re a cybersecurity leader you have probably heard some variation of this question from people skepti...

Cloud Security Study: Most Surveyed Organizations Suffered a Cloud-Related Breach Over an 18-Month Period

Blog Published: 07/02/2024

Originally published by Tenable. Written by Diane Benjuya. What issues affect cloud security teams today? How are they tackling these challenges? Which tools do they use to measure success? These are just a few of the questions Tenable sought to answer in its recently published "2024 Cloud Sec...

AI Deepfake Security Concerns

Blog Published: 06/25/2024

Ken Huang is the CEO of DistributedApps.ai and Co-Chair of the CSA AI Organizational Responsibilities and AI Controls Working Groups. Huang is an acclaimed author of eight books on AI and Web3, a core contributor to OWASP's Top 10 Risks for LLM Applications, and heavily involved in the NIST Ge...

Supremacy of AI in Compliance Services: The Dawn of a New Era

Blog Published: 07/02/2024

Written by Ashwin Chaudhary, CEO, Accedere.In the ever-evolving world of finance and business, compliance has always been a critical pillar. However, the traditional methods of ensuring compliance are becoming gradually more inadequate in the face of growing regulatory complexity and data volu...

Quantum Readiness Importance: A Comprehensive Guide

Blog Published: 07/03/2024

Written by Ascertia.Digital security is evolving at a blistering pace. The advent of quantum computing represents both a formidable challenge and a significant opportunity. Ascertia recognises the need for businesses to prepare for this technological shift to ensure the integrity of digital id...

Navigating IT-OT Convergence: A Strategic Imperative for Enterprise Success

Blog Published: 07/01/2024

Written by S Sreekumar, VP and Global Practice Head, Cybersecurity, HCLTech and José Grandmougin, Senior Director Consulting System Engineering GSI and OT, Fortinet.In the ever-evolving landscape of digital transformation, the convergence of Information Technology (IT) and Operational Technolo...

The Rise of QR Code Phishing Attacks: Exploring Quishing Threats

Blog Published: 07/01/2024

Originally published by Abnormal Security.Bad actors have been using phishing emails to steal sensitive data for three decades. Impersonating a trusted individual or brand and manufacturing a sense of urgency, attackers deceive targets into providing private information like login credentials ...

And now for something completely different… a Cloud Security Alliance RFI

Blog Published: 07/01/2024

The RFI submission period is now closed. Learn more about CSA's current AI activities by filling out our interest form. This blog is markedly different from any other I have posted on our website. While we have responded to a few Requests for Proposal (RFP) or Requests for Information (RFI) ov...

CCSK v5: Updated Cloud Security Knowledge with a Unique Pedigree

Blog Published: 07/16/2024

Written by Martin Hall.Cloud computing continues to become even more pivotal to business and consumer lives. AI has added a disruptive new dimension and set of opportunities to add further cloud power and complexity. And Zero Trust has emerged as a central principle for securing cloud assets. ...

How to Calculate Security Posture

Blog Published: 07/08/2024

Originally published by Normalyze.Written by Vamsi Koduru.To many, data security posture can seem like an abstruse concept that’s difficult to understand, much less quantify. But by developing a clear methodology and breaking the process down into measurable steps, data security teams can prov...

The Cybersecurity Tower of Babel Requires Focus on Business Fundamentals: Part 1

Blog Published: 07/11/2024

Written by Elad Yoran & Patricia Schouker. The adage "the only constant is change" was relevant at this year’s RSA Conference when it comes to enterprise cybersecurity. While much attention was appropriately focused on the possible implications of AI on security, conversations with CISOs i...

The Importance of STAR Level 1 for Achieving STAR Level 2: A Comprehensive Overview

Blog Published: 07/12/2024

As organizations strive to enhance their security posture and demonstrate compliance with industry standards, the Cloud Security Alliance (CSA) STAR certification program offers a robust framework for cloud security assurance. However, the journey from STAR Level 1 to STAR Level 2 involves mor...

Cloud Security Alliance Sets New Standard in Cloud Security Expertise with the Certificate of Cloud Security Knowledge (CCSK) v5

Press Release Published: 07/16/2024

Latest version of CSA’s vendor-neutral, cloud security training and certificate provides a comprehensive catalog of the essential knowledge cybersecurity professionals need to masterSEATTLE – July 16, 2024 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defin...

Looking for the CCM?

Start using the Cloud Controls Matrix to simplify compliance with multiple standards & regulations.