ChaptersCircleEventsBlog
Get early access to CSA’s Trusted AI Safety Certification Program—updates, resources & beta invites!

All Articles

All Articles
Incident Response in Cloud Security

Blog Published: 07/25/2024

Written by Ashwin Chaudhary, CEO, Accedere. Computer security incident response has become an important component of information technology (IT) programs. Cybersecurity-related attacks have become not only more numerous and diverse but also more damaging and disruptive. New types of security-...

Determining the Potential Data Attack Surface and Reducing the Blast Radius in Light of the Snowflake News

Blog Published: 07/29/2024

Originally published by Cyera on June 5, 2024.Written by Chris Hines.Earlier this week, the industry learned of the recent increase in attacks against customers of the DBaaS platform Snowflake.In a community post issued by Snowflake on Monday, the company stated that they “believe this is the ...

Thriving in 2030: The Future of Compliance and Risk Management

Blog Published: 07/30/2024

Originally published by RegScale.RegScale CEO Travis Howerton recently contributed an insightful byline to Security Magazine, “Thriving in 2030: The Future of Compliance and Risk Management.” This article details the future landscape of compliance and risk management as we approach 2030. It de...

Cybersecurity Training for Employees: Upskill the Easy Way with CSA Team Training Programs

Blog Published: 07/23/2024

The cost and challenge of finding cybersecurity talent is nothing new. Equally challenging is ensuring all stakeholders across your organization have the knowledge they need to stay safe online. The best solution we’ve found is to train up your existing teams, providing:Solid security foundati...

NHI Attacks Making Waves: Insights on Latest 5 Incidents

Blog Published: 07/19/2024

Originally published by Astrix.Non-human identity (NHI) attacks are making waves in the cybersecurity landscape, with five high-profile incidents reported in the past few weeks alone. To help you stay on top of this threat vector, our research team provides insights on the latest incidents in ...

The Anatomy of Cloud Identity Security

Blog Published: 07/22/2024

Originally published by CyberArk.Written by Alyssa Miles.There’s currently a cybersecurity adage with varying verbiage and claimed origins – the point, however, is unmistakable:“Attackers don’t break in. They log in.“This saying underscores the strategic shift associated with cloud adoption’s ...

How Continuous Controls Monitoring Solves Traditional GRC Challenges

Blog Published: 07/23/2024

Originally published by RegScale.Addressing compliance and ensuring strong security measures are increasingly complex tasks for organizations. How can you effectively manage these challenges? Continuous Controls Monitoring (CCM) offers a robust solution, leveraging automation, AI, and real-tim...

Need a Penetration Test? Here’s What to Do Next

Blog Published: 07/24/2024

Originally published by Schellman.In our experience, there are typically three reasons why you may move forward with a penetration test and start looking around for a provider. Making that initial decision to move forward with an assessment like this is a big step, but what should you do after...

Cloud Security Alliance Issues Artificial Intelligence (AI) Model Risk Management Framework

Press Release Published: 07/24/2024

Paper emphasizes importance of model risk management (MRM) for harnessing full potential of AI and machine learning (ML) modelsSEATTLE – July 24, 2024 – The latest set of AI guidance from the Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certi...

Adding a Twist to the Epic of Vulnerability Management

Blog Published: 07/25/2024

Originally published by CXO REvolutionaries.Written by Sam Curry, VP & CISO in Residence, Zscaler.“History doesn’t repeat itself, but it often rhymes.”–Mark TwainWe are in our fourth decade since the Security Administrator Tool for Analyzing Networks (SATAN) hit the scene and we have to as...

Mitigating Risks During Mergers and Acquisitions in Healthcare with Security Testing

Blog Published: 08/01/2024

Originally published by Synack.In the fast-paced world of mergers and acquisitions (M&A), ensuring the security of digital assets is paramount—especially for organizations with highly sensitive data like healthcare.In 2023, Kaiser Permanente began the process of acquiring Geisinger in a $5...

Navigating Data Privacy in the Age of AI: How to Chart a Course for Your Organization

Blog Published: 07/26/2024

Originally published by BARR Advisory.Artificial intelligence (AI) raises significant data privacy concerns due to its ability to collect, analyze, and utilize vast amounts of personal information. So what role do companies that have implemented AI play in keeping user data secured? Let’s dive...

Top 4 Use Cases of Non-Human Identity Security: Live Event Recap

Blog Published: 07/26/2024

Originally published by Astrix on June 13, 2024.Last week we held an insightful live event featuring our solutions engineer, Michael Silva, and our CISO in Residence, Tim Youngblood. The event focused on the top four non-human identity (NHI) use cases that are crucial for security teams. Here’...

The Future of Identity Security: Lessons from the Change Health Breach

Blog Published: 07/29/2024

Originally published by Oasis Security.UnitedHealth Group confirmed that in February, the BlackCat/ALPHV ransomware group breached Change Healthcare by exploiting compromised credentials for a Citrix remote access portal that lacked multi-factor authentication (MFA)."On February 12, criminals ...

How to Create Efficiencies in Your ISO 27001 Certification

Blog Published: 07/30/2024

Originally published by Schellman.Ever been on the road with Google Maps or something similar handling your navigation? Whether you’ve driven the route from Point A to Point B before, or if this is your first time making your way, we’re grateful for the assistance and confirmation that we’re t...

Modern Terms and Concepts for a Zero Trust Mindset

Blog Published: 07/26/2024

When Zero Trust was first coined by John Kindervag in 2009, it challenged the “trust but verify” approach of traditional security models. At the time, Zero Trust required us to challenge the assumption that trust is implicit. Especially with the complex networks, systems, and services that we ...

The Danger of Sharing Files with “Anyone with the Link”: Examining a Risky Google Drive Misconfiguration

Blog Published: 07/30/2024

Originally published by Valence.Often when it comes to security, a significant risk results from an action that is so easy that we tend to overlook the risk itself. Sharing a file using the “anyone with the link” option is the equivalent of leaving a treasure chest unlocked, overflowing with s...

How Time, Entitlements and Approvals (TEA) Can Secure the Keys to Your Cloud

Blog Published: 07/31/2024

Originally published by CyberArk.Written by Mike Bykat.A popular topic of conversation in my day-to-day work is how to secure privileged access to cloud management consoles and workloads. And that’s no surprise, considering more and more applications and workloads are migrating to the cloud.Up...

Breach Debrief: Snowflake MFA Meltdown Creates Data Leak Blizzard

Blog Published: 07/31/2024

Originally published by Adaptive Shield.Written by Maor Bin, CEO & Co-Founder, Adaptive Shield.On May 27, a threat actor group called ShinyHunters announced that it was selling 560 million records stolen in a data breach. The records include names, email addresses, physical addresses, and ...

Zooming In: 6 Ways Cybercriminals Use the Black Market to Steal Zoom User Data

Blog Published: 08/01/2024

Originally published by Abnormal Security.In the wake of the COVID-19 pandemic, video conferencing platforms like Zoom experienced an unprecedented surge in popularity. However, this increased usage also attracted the attention of cybercriminals who sought to exploit the platform's growing use...

Looking for the CCM?

Start using the Cloud Controls Matrix to simplify compliance with multiple standards & regulations.