ChaptersCircleEventsBlog
Get early access to CSA’s Trusted AI Safety Certification Program—updates, resources & beta invites!

All Articles

All Articles
Do SOC 2 and ISO 27001 the Right Way with CSA STAR

Blog Published: 06/21/2024

At the CSA Cloud Trust Summit 2024, CSA’s CEO Jim Reavis gave the presentation “Do SOC 2 and ISO 27001 the right way with CSA STAR.” In this condensed transcript of the presentation, Jim provides an overview of the SOC 2 and ISO 27001 frameworks and how they relate to the CSA STAR program. You...

9 Best Practices for Preventing Credential Stuffing Attacks

Blog Published: 06/26/2024

Written by StrongDM.Online accounts are repositories of sensitive personal information, making it crucial to protect this data from cybercriminals. As credential stuffing attacks become more frequent, it's essential to stay one step ahead of attackers to ensure the security of your employees' ...

AI Data Considerations and How ISO 42001—and ISO 9001—Can Help

Blog Published: 06/28/2024

Originally published by Schellman.While the rapid pace at which artificial intelligence (AI) technology has been both developing and impacting several areas of our daily lives continues, so too do the concerns about the tech’s safety, privacy, and bias. As there’s no stopping the ongoing integ...

Building Security Around Human Vulnerabilities

Blog Published: 06/25/2024

Written by Benjamin Corll, CISO in Residence, Zscaler.Why are organizations spending money on cybersecurity solutions when studies show 88% of data breaches are caused by human mistakes? If you’re a cybersecurity leader you have probably heard some variation of this question from people skepti...

Cloud Security Study: Most Surveyed Organizations Suffered a Cloud-Related Breach Over an 18-Month Period

Blog Published: 07/02/2024

Originally published by Tenable. Written by Diane Benjuya. What issues affect cloud security teams today? How are they tackling these challenges? Which tools do they use to measure success? These are just a few of the questions Tenable sought to answer in its recently published "2024 Cloud Sec...

AI Deepfake Security Concerns

Blog Published: 06/25/2024

Ken Huang is the CEO of DistributedApps.ai and Co-Chair of the CSA AI Organizational Responsibilities and AI Controls Working Groups. Huang is an acclaimed author of eight books on AI and Web3, a core contributor to OWASP's Top 10 Risks for LLM Applications, and heavily involved in the NIST Ge...

Supremacy of AI in Compliance Services: The Dawn of a New Era

Blog Published: 07/02/2024

Written by Ashwin Chaudhary, CEO, Accedere.In the ever-evolving world of finance and business, compliance has always been a critical pillar. However, the traditional methods of ensuring compliance are becoming gradually more inadequate in the face of growing regulatory complexity and data volu...

Quantum Readiness Importance: A Comprehensive Guide

Blog Published: 07/03/2024

Written by Ascertia.Digital security is evolving at a blistering pace. The advent of quantum computing represents both a formidable challenge and a significant opportunity. Ascertia recognises the need for businesses to prepare for this technological shift to ensure the integrity of digital id...

Navigating IT-OT Convergence: A Strategic Imperative for Enterprise Success

Blog Published: 07/01/2024

Written by S Sreekumar, VP and Global Practice Head, Cybersecurity, HCLTech and José Grandmougin, Senior Director Consulting System Engineering GSI and OT, Fortinet.In the ever-evolving landscape of digital transformation, the convergence of Information Technology (IT) and Operational Technolo...

The Rise of QR Code Phishing Attacks: Exploring Quishing Threats

Blog Published: 07/01/2024

Originally published by Abnormal Security.Bad actors have been using phishing emails to steal sensitive data for three decades. Impersonating a trusted individual or brand and manufacturing a sense of urgency, attackers deceive targets into providing private information like login credentials ...

And now for something completely different… a Cloud Security Alliance RFI

Blog Published: 07/01/2024

The RFI submission period is now closed. Learn more about CSA's current AI activities by filling out our interest form. This blog is markedly different from any other I have posted on our website. While we have responded to a few Requests for Proposal (RFP) or Requests for Information (RFI) ov...

CCSK v5: Updated Cloud Security Knowledge with a Unique Pedigree

Blog Published: 07/16/2024

Written by Martin Hall.Cloud computing continues to become even more pivotal to business and consumer lives. AI has added a disruptive new dimension and set of opportunities to add further cloud power and complexity. And Zero Trust has emerged as a central principle for securing cloud assets. ...

How to Calculate Security Posture

Blog Published: 07/08/2024

Originally published by Normalyze.Written by Vamsi Koduru.To many, data security posture can seem like an abstruse concept that’s difficult to understand, much less quantify. But by developing a clear methodology and breaking the process down into measurable steps, data security teams can prov...

The Cybersecurity Tower of Babel Requires Focus on Business Fundamentals: Part 1

Blog Published: 07/11/2024

Written by Elad Yoran & Patricia Schouker. The adage "the only constant is change" was relevant at this year’s RSA Conference when it comes to enterprise cybersecurity. While much attention was appropriately focused on the possible implications of AI on security, conversations with CISOs i...

The Importance of STAR Level 1 for Achieving STAR Level 2: A Comprehensive Overview

Blog Published: 07/12/2024

As organizations strive to enhance their security posture and demonstrate compliance with industry standards, the Cloud Security Alliance (CSA) STAR certification program offers a robust framework for cloud security assurance. However, the journey from STAR Level 1 to STAR Level 2 involves mor...

Cloud Security Alliance Sets New Standard in Cloud Security Expertise with the Certificate of Cloud Security Knowledge (CCSK) v5

Press Release Published: 07/16/2024

Latest version of CSA’s vendor-neutral, cloud security training and certificate provides a comprehensive catalog of the essential knowledge cybersecurity professionals need to masterSEATTLE – July 16, 2024 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defin...

Navigating the New SEC Cybersecurity Regulations in M&A Transactions

Blog Published: 07/03/2024

Originally published by CXO REvolutionaries.Picture this: you've just finalized your M&A deal, only to discover a cybersecurity incident emerging—whether it's a breach, data leak, or system compromise. Suddenly, the clock is ticking, and you're faced with a tight deadline to report this ma...

Bridging the Gap: How to Ensure Seamless Collaboration Between Security & Development Teams

Blog Published: 07/08/2024

Written by Urvi Mehta, ArmorCode.In today's interconnected digital landscape, software serves as the backbone, driving the evolution of increasingly sophisticated applications. While this evolution fuels progress and exciting features, it also creates a vast playground for cyber threats. Simpl...

Why ASPM is Critical Now—And How You Can Make It Happen

Blog Published: 07/10/2024

Originally published by Dazz.Written by Tomer Schwartz, Co-founder & CTO, Dazz.By 2026, 40% of organizations will have an Application Security Posture Management solution (ASPM) in place, according to Gartner. What’s driving the need for ASPM solutions? The Cloud Security Alliance (CSA) re...

Combatting Data Security Cluelessness

Blog Published: 07/11/2024

Written by Nikhil Girdhar, Sr. Director of Data Security, Securiti AI.In cybersecurity, the old adage you 'can’t protect what you can’t see' rings especially true. While the initial step of discovering and classifying sensitive data is critical, it's just the beginning. Many security teams fin...

Looking for the CCM?

Start using the Cloud Controls Matrix to simplify compliance with multiple standards & regulations.