Do SOC 2 and ISO 27001 the Right Way with CSA STAR
Blog Published: 06/21/2024
At the CSA Cloud Trust Summit 2024, CSA’s CEO Jim Reavis gave the presentation “Do SOC 2 and ISO 27001 the right way with CSA STAR.” In this condensed transcript of the presentation, Jim provides an overview of the SOC 2 and ISO 27001 frameworks and how they relate to the CSA STAR program. You...
9 Best Practices for Preventing Credential Stuffing Attacks
Blog Published: 06/26/2024
Written by StrongDM.Online accounts are repositories of sensitive personal information, making it crucial to protect this data from cybercriminals. As credential stuffing attacks become more frequent, it's essential to stay one step ahead of attackers to ensure the security of your employees' ...
AI Data Considerations and How ISO 42001—and ISO 9001—Can Help
Blog Published: 06/28/2024
Originally published by Schellman.While the rapid pace at which artificial intelligence (AI) technology has been both developing and impacting several areas of our daily lives continues, so too do the concerns about the tech’s safety, privacy, and bias. As there’s no stopping the ongoing integ...
Building Security Around Human Vulnerabilities
Blog Published: 06/25/2024
Written by Benjamin Corll, CISO in Residence, Zscaler.Why are organizations spending money on cybersecurity solutions when studies show 88% of data breaches are caused by human mistakes? If you’re a cybersecurity leader you have probably heard some variation of this question from people skepti...
Cloud Security Study: Most Surveyed Organizations Suffered a Cloud-Related Breach Over an 18-Month Period
Blog Published: 07/02/2024
Originally published by Tenable. Written by Diane Benjuya. What issues affect cloud security teams today? How are they tackling these challenges? Which tools do they use to measure success? These are just a few of the questions Tenable sought to answer in its recently published "2024 Cloud Sec...
AI Deepfake Security Concerns
Blog Published: 06/25/2024
Ken Huang is the CEO of DistributedApps.ai and Co-Chair of the CSA AI Organizational Responsibilities and AI Controls Working Groups. Huang is an acclaimed author of eight books on AI and Web3, a core contributor to OWASP's Top 10 Risks for LLM Applications, and heavily involved in the NIST Ge...
Supremacy of AI in Compliance Services: The Dawn of a New Era
Blog Published: 07/02/2024
Written by Ashwin Chaudhary, CEO, Accedere.In the ever-evolving world of finance and business, compliance has always been a critical pillar. However, the traditional methods of ensuring compliance are becoming gradually more inadequate in the face of growing regulatory complexity and data volu...
Quantum Readiness Importance: A Comprehensive Guide
Blog Published: 07/03/2024
Written by Ascertia.Digital security is evolving at a blistering pace. The advent of quantum computing represents both a formidable challenge and a significant opportunity. Ascertia recognises the need for businesses to prepare for this technological shift to ensure the integrity of digital id...
Navigating IT-OT Convergence: A Strategic Imperative for Enterprise Success
Blog Published: 07/01/2024
Written by S Sreekumar, VP and Global Practice Head, Cybersecurity, HCLTech and José Grandmougin, Senior Director Consulting System Engineering GSI and OT, Fortinet.In the ever-evolving landscape of digital transformation, the convergence of Information Technology (IT) and Operational Technolo...
The Rise of QR Code Phishing Attacks: Exploring Quishing Threats
Blog Published: 07/01/2024
Originally published by Abnormal Security.Bad actors have been using phishing emails to steal sensitive data for three decades. Impersonating a trusted individual or brand and manufacturing a sense of urgency, attackers deceive targets into providing private information like login credentials ...
And now for something completely different… a Cloud Security Alliance RFI
Blog Published: 07/01/2024
The RFI submission period is now closed. Learn more about CSA's current AI activities by filling out our interest form. This blog is markedly different from any other I have posted on our website. While we have responded to a few Requests for Proposal (RFP) or Requests for Information (RFI) ov...
CCSK v5: Updated Cloud Security Knowledge with a Unique Pedigree
Blog Published: 07/16/2024
Written by Martin Hall.Cloud computing continues to become even more pivotal to business and consumer lives. AI has added a disruptive new dimension and set of opportunities to add further cloud power and complexity. And Zero Trust has emerged as a central principle for securing cloud assets. ...
How to Calculate Security Posture
Blog Published: 07/08/2024
Originally published by Normalyze.Written by Vamsi Koduru.To many, data security posture can seem like an abstruse concept that’s difficult to understand, much less quantify. But by developing a clear methodology and breaking the process down into measurable steps, data security teams can prov...
The Cybersecurity Tower of Babel Requires Focus on Business Fundamentals: Part 1
Blog Published: 07/11/2024
Written by Elad Yoran & Patricia Schouker. The adage "the only constant is change" was relevant at this year’s RSA Conference when it comes to enterprise cybersecurity. While much attention was appropriately focused on the possible implications of AI on security, conversations with CISOs i...
The Importance of STAR Level 1 for Achieving STAR Level 2: A Comprehensive Overview
Blog Published: 07/12/2024
As organizations strive to enhance their security posture and demonstrate compliance with industry standards, the Cloud Security Alliance (CSA) STAR certification program offers a robust framework for cloud security assurance. However, the journey from STAR Level 1 to STAR Level 2 involves mor...
Cloud Security Alliance Sets New Standard in Cloud Security Expertise with the Certificate of Cloud Security Knowledge (CCSK) v5
Press Release Published: 07/16/2024
Latest version of CSA’s vendor-neutral, cloud security training and certificate provides a comprehensive catalog of the essential knowledge cybersecurity professionals need to masterSEATTLE – July 16, 2024 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defin...
Navigating the New SEC Cybersecurity Regulations in M&A Transactions
Blog Published: 07/03/2024
Originally published by CXO REvolutionaries.Picture this: you've just finalized your M&A deal, only to discover a cybersecurity incident emerging—whether it's a breach, data leak, or system compromise. Suddenly, the clock is ticking, and you're faced with a tight deadline to report this ma...
Bridging the Gap: How to Ensure Seamless Collaboration Between Security & Development Teams
Blog Published: 07/08/2024
Written by Urvi Mehta, ArmorCode.In today's interconnected digital landscape, software serves as the backbone, driving the evolution of increasingly sophisticated applications. While this evolution fuels progress and exciting features, it also creates a vast playground for cyber threats. Simpl...
Why ASPM is Critical Now—And How You Can Make It Happen
Blog Published: 07/10/2024
Originally published by Dazz.Written by Tomer Schwartz, Co-founder & CTO, Dazz.By 2026, 40% of organizations will have an Application Security Posture Management solution (ASPM) in place, according to Gartner. What’s driving the need for ASPM solutions? The Cloud Security Alliance (CSA) re...
Combatting Data Security Cluelessness
Blog Published: 07/11/2024
Written by Nikhil Girdhar, Sr. Director of Data Security, Securiti AI.In cybersecurity, the old adage you 'can’t protect what you can’t see' rings especially true. While the initial step of discovering and classifying sensitive data is critical, it's just the beginning. Many security teams fin...