Elevating Security Standards with AI Cloud Security Compliance Tools
Blog Published: 10/28/2024
Written by Ashwin Chaudhary, CEO, Accedere.Organizations are quickly moving to cloud environment in today's digital landscape due to it’s potential for cost savings, scalability, and flexibility. But this change also brings a complicated new set of compliance and security issues. Here are AI c...
The Current Landscape of Global AI Regulations
Blog Published: 10/22/2024
Originally published by Truyo.As artificial intelligence (AI) continues to permeate various aspects of our lives, understanding the regulatory frameworks governing its development and application is becoming increasingly important. From the United States to China, different countries are adopt...
7 Ways Data Access Governance Increases Data ROI
Blog Published: 10/23/2024
Originally published by Normalyze.Written by Vamsi Koduru.Data is the backbone of your organization’s success—fueling informed decision-making, streamlining operations, enhancing customer experiences, and driving innovation. But without proper governance, you may not achieve these benefits. Th...
Cloud Security Alliance Releases Second Paper Delineating Organizational Responsibilities for Successfully and Ethically Implementing Artificial Intelligence
Press Release Published: 10/22/2024
Paper provides comprehensive, industry-neutral guidelines and best practices for various stakeholders, from CISOs and AI developers to business leaders and policymakersSEATTLE – Oct. 22, 2024 – Driven by the need to address the evolving landscape of Artificial Intelligence (AI) and its associa...
The Hidden Power of Zero Trust Thinking
Blog Published: 10/30/2024
Written by Mark Fishburn and originally published on his website.1. Daytime Stress and Sleepless Nights Managing cybersecurity, networks, workloads, and websites can be stressful, especially when many things go bump simultaneously in the middle of the night. During calmer daytime moments, w...
Unpacking the Cloud Security Best Practices from CISA and the NSA
Blog Published: 10/25/2024
Originally published by Tenable. Written by Zan Liffick. Recent cloud security guidance from CISA and the NSA offers a wealth of recommendations to help organizations reduce risk. This blog highlights key takeaways, provides further insights from CIS, and explores how utilizing cloud sec...
Top IAM Priorities for 2025: Addressing Multi-Cloud Identity Management Challenges
Blog Published: 10/30/2024
As we move toward 2025, the adoption of multi-cloud and hybrid cloud is continuing to accelerate. While the benefits are manifold, it also means that organizations have significant challenges when securely integrating hybrid and cloud identity systems.Just some of these challenges identity and...
The EU Cloud Code of Conduct: Apply GDPR Compliance Regulations to the Cloud
Blog Published: 10/31/2024
The CSA Security Update podcast is hosted by John DiMaria, Director of Operations Excellence at CSA. The podcast explores the CSA STAR program, cloud security best practices, and associated technologies. In this blog series, we edit key podcast episodes into shorter Q&As. Today’s post e...
Shadow AI Prevention: Safeguarding Your Organization’s AI Landscape
Blog Published: 10/24/2024
Written by CSA's AI Organizational Responsibility Working Group.In today’s rapidly evolving technological landscape, the rise of Shadow AI poses a significant challenge to organizations. Shadow AI refers to unauthorized or undocumented AI systems within an organization, which can compromise se...
Elevating Alert Readiness: A People-First Approach for CISOs
Blog Published: 10/25/2024
Originally published by Devoteam.The Gartner Security & Risk Management Summit 2024 hammered home the need for a proactive and resilient approach to cybersecurity. Sure, there were plenty of shiny new technologies and strategies on display, but the biggest takeaway for me was the resoundin...
Are Companies Becoming More Transparent About Cyber Incidents?
Blog Published: 10/28/2024
Originally published by CXO REvolutionaries.Written by Nat Smith, Sr. Director, Product Management, Zscaler.Not long ago, companies were hesitant to disclose cyber incidents, fearing a backlash and damage to their reputations, and a loss of customer trust. In 2017, Equifax waited six weeks to ...
How CSA Research Uses the Cloud Controls Matrix to Address Diverse Security Challenges
Blog Published: 10/25/2024
CSA extensively leverages the Cloud Controls Matrix (CCM) to enhance security practices across various domains of cloud research. The CCM is a comprehensive cloud security framework consisting of 197 security control objectives. The main purpose of the framework is to help organizations addres...
How to Assess and Treat AI Risks and Impacts with ISO/IEC 42001:2023
Blog Published: 10/30/2024
Originally published by Schellman.ISO/IEC 42001:2023 is rapidly becoming the global standard for Artificial Intelligence (AI) governance. While it is a close cousin of ISO/IEC 27001:2022, ISO 42001—rather than focusing primarily on cyber and information security—takes a more holistic approach ...
New Paper from Cloud Security Alliance Examines Considerations and Application of Zero Trust Principles for Critical Infrastructure
Press Release Published: 10/29/2024
Paper bridges gap between traditional information technology security methodologies and the unique demands of critical infrastructure sectorsSEATTLE – Oct. 29, 2024 – In today's interconnected world, critical infrastructure (CI) sectors face an ever-evolving landscape of cyber and physical thr...
Streamlining Cloud Security: Integrating CSA CCM Controls into Your ISO/IEC 27001 Framework
Blog Published: 10/29/2024
In today’s rapidly evolving security landscape, it can be overwhelming to manage multiple frameworks, especially for organizations striving for excellence in cloud security. The CSA Cloud Controls Matrix (CCM) is a gold standard in cloud security governance, providing a detailed map of best pr...
Dispelling the ‘Straight Line’ Myth of Zero Trust Transformation
Blog Published: 11/04/2024
Originally published by CXO REvolutionaries.Written by Guido Sacchi, Former Senior Executive Vice President and Chief Information Officer, Global Payments.Throughout my career, I always reacted to ideas of “zero trust” the same way. It sounds great in principle, but how do we execute on it? Ho...
According to Cloud Security Alliance Survey More than Half of Organizations Cite Technical Debt as Top Hurdle to Identity System Modernization
Press Release Published: 10/30/2024
Report also found that over 75% of enterprises are using two or more IDPs and struggle to manage access controls and consistent security policiesSEATTLE – Oct. 30, 2024 – Modernizing identity systems is proving difficult for organizations due to two key challenges: decades of accumulated Ident...
Tackling Ransomware Head-On: A Business’s Guide to Understanding and Defense
Blog Published: 10/31/2024
Originally published by Richey May.In today’s cybersecurity landscape, threats are more than just a cautionary tale—they’re a daily reality, and ransomware tops the list of concerns. This aggressive form of cyberattack can grind operations to a halt and compromise sensitive data. Keep reading,...
How to Get your Cyber Essentials Certification: A Process Guide
Blog Published: 10/31/2024
Originally published Vanta.Most organizations today are heavily reliant on technology, regardless of the product or service they provide. This expands their data exposure points and potential attack surface, which is why there is a significant need to monitor the risks and vulnerabilities in t...
Modernization Strategies for Identity and Access Management
Blog Published: 11/04/2024
Originally published by Britive.Shifting technology and access needs make identity and access management (IAM) a priority for all major organizations today. As infrastructure modernization efforts accelerate and businesses are increasingly adopting cloud-first approaches to their architecture ...