ChaptersCircleEventsBlog
Get early access to CSA’s Trusted AI Safety Certification Program—updates, resources & beta invites!

All Articles

All Articles
Apple Intelligence Private Cloud Compute (PCC) Initial Threat Modeling

Blog Published: 08/14/2024

Originally published on LinkedIn.Written by Ken Huang, CISSP.Apple has introduced a groundbreaking system called Private Cloud Compute (PCC) to enable secure and private AI processing in the cloud for its Apple Intelligence platform. While PCC represents a giant step forward in privacy-preserv...

StateRAMP FAQ

Blog Published: 08/15/2024

Originally published by Schellman.For those wanting to acquaint themselves with StateRAMP, we’ve put together answers to some of the most frequently asked questions we receive as a Third-Party Assessment Organization (3PAO). These important points of interest regarding this framework are divid...

How to Debug a Blue Screen of Death

Blog Published: 08/16/2024

Originally published by ThreatLocker.What is a Blue Screen of Death?The Blue Screen of Death (BSOD), a stop error or system crash, is an error screen displayed on Windows computers following a fatal system error. This error causes the system to stop completely, requiring a restart to temporari...

Implementing a Successful Cloud Tagging Strategy: Everything You Need to Know

Blog Published: 08/16/2024

Originally published by Tenable. Written by Tom Croll, Advisor at Lionfish Tech Advisors. To manage your cloud resources effectively and securely, consistent tagging of assets across all cloud platforms is essential. In this blog, we’ll explain tagging’s main benefits, as well as strategies ...

What is SaaS Security?

Blog Published: 08/19/2024

Originally published by Own Company.Software-as-a-service (SaaS) has become a foundational element of modern businesses. Tapping into scalable, robust SaaS applications provides your organization with the agility it needs to compete. However, these apps also contain abundant sensitive data, wh...

June Recap: New AWS Sensitive Permissions and Services

Blog Published: 08/19/2024

Originally published by Sonrai Security.Written by Tally Shea.As AWS continues to evolve, new services and permissions are frequently introduced to enhance functionality and security. This blog provides a comprehensive recap of new sensitive permissions and services added in June. Our intentio...

How to Get the Most from Your Cloud Security Assessment

Blog Published: 08/20/2024

Originally published by Bell.Written by Jack Mann, Senior Technical Product Manager, Cyber Security, Bell. A cloud security assessment can provide great insight into how well you’re protecting your cloud-based data and workloads. However, the actual value of that assessment to your organizati...

Everything You Should Know About Continuous Controls Monitoring (CCM)

Blog Published: 08/21/2024

Originally published by Vanta.Continuous controls monitoring (CCM) is a crucial aspect of making GRC processes more automated, accurate, and actionable through technology. It helps organizations transition from inefficient point-in-time checks to automation-driven compliance controls that prov...

PAM and Cloud Security: The Case for Zero Standing Privileges

Blog Published: 08/22/2024

Originally published by CyberArk.Written by Charles Chu. The cloud has introduced entirely new environments, roles and circumstances that require us to reimagine the definition of privileged access management (PAM) and how to apply those principles to secure identities. PAM was built on the...

How to Prepare for a SOC 2 Audit: 5 Tips from an Auditor

Blog Published: 08/26/2024

Originally published by BARR Advisory.Just like you’d map out an itinerary for an upcoming vacation or create a menu prior to a dinner party, preparing for your SOC 2 audit ahead of time can make the experience significantly smoother and more efficient. So how can you best prepare for the SOC ...

How to De-Risk Patching Third Party Software Packages

Blog Published: 08/28/2024

Originally published by Vanta.There are several steps your organization must take to protect itself from potentially exploitable packages. First, you’ll need to carefully review and triage the package vulnerabilities that present risk to your organization, then you’ll need to patch each one. P...

Who Needs a vCISO and Why?

Blog Published: 08/12/2024

Originally published by BARR Advisory.A virtual Chief Information Security Officer (vCISO) is essential for organizations that lack the resources or expertise to manage cybersecurity in-house. Typically, small to mid-sized businesses, startups, or companies undergoing rapid growth benefit the ...

Understanding the Shared Responsibility Model in SaaS

Blog Published: 08/13/2024

Originally published by Valence.Written by Jason Silberman.The recent attacks targeting data in customers of Snowflake, a SaaS application focused on data storage, serve as a critical reminder of the importance of understanding the Shared Responsibility Model in SaaS security. While initial re...

What are Service Accounts, and Why are They Important to Secure?

Blog Published: 08/13/2024

Originally published by Astrix.What are service accounts?Service Accounts are Non-Human Identity accounts used by machines or apps to communicate with one another within a system, unlike user or human accounts.Service Accounts, using machine credentials, provide privileged identities and permi...

Cloud Security Alliance Issues Paper Detailing Unique Challenges and Risks Presented by Use of Large Language Models (LLMs)

Press Release Published: 08/14/2024

Guide details general design principles and best practices related to authorization concernsSEATTLE – Aug. 14, 2024 – Securing LLM Backed Systems: Essential Authorization Practices, the latest report from the Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining...

Email Security Threats in Europe: Insights into Attack Trends

Blog Published: 08/15/2024

Originally published by Abnormal Security.The data doesn’t lie: cybercriminals launch email attacks targeting every organization—regardless of size, industry, or location. However, while these threats are geographically agnostic and our research has revealed that the volume of nearly all attac...

CISOs Should Brace for Massive Context, Coverage, and Communication Upgrade, Says CSA AI Leader

Blog Published: 08/14/2024

Originally published by CXO REvolutionaries.Written by Christopher Jablonski, Director, CXO REvolutionaries & Community.During his keynote at the CSA AI Summit (part of RSA Conference) last week in San Francisco, Caleb Sima, the Chair of the Cloud Security Alliance AI Safety Initiative, po...

NIST FIPS 203, 204, and 205 Finalized: An Important Step Towards a Quantum-Safe Future

Blog Published: 08/15/2024

Written by Mehak Kalsi, Co-Chair, CSA Quantum-Safe Security Working Group.Reviewed by Bruno Huttner, Co-Chair, CSA Quantum-Safe Security Working Group.The Quantum Computing ecosystem has been waiting with bated breath for this moment and it’s finally here. The National Institute of Standards a...

4 Steps for a Unified, Effective, and Continuous Compliance Program

Blog Published: 08/16/2024

Originally published by Scrut Automation.Regulatory Maze is Turning Everyone into a Lost Tourist The growing complexity of regulatory requirements has led to fragmentation in compliance programs across organizations of all sizes. Efforts to develop and enforce consolidated compliance programs ...

Avoiding Collapse in a Tech-Stacked World: How Staying Still Can Create Fragile Defences

Blog Published: 08/19/2024

Written by Vaibhav Dutta, Associate Vice President and Global Head-Cybersecurity Products & Practice, Tata Communications.Originally published on Frontier Enterprise.Ransomware activity alone was up 50% year-on-year during the first half of 2023. We have been seeing a relentless rise in th...

Looking for the CCM?

Start using the Cloud Controls Matrix to simplify compliance with multiple standards & regulations.