Cloud 101CircleEventsBlog
Master CSA’s Security, Trust, Assurance, and Risk program—download the STAR Prep Kit for essential tools to enhance your assurance!

All Articles

All Articles
Cloud Security Alliance Paper Addresses Challenges of Implementing Zero Trust in Environments Where Artificial Intelligence (AI)-induced Shadow Access Is Prevalent

Press Release Published: 05/07/2024

Traditional Zero Trust approaches must adapt to the nuances of Generative AI (GenAI) technology to strengthen cybersecurityRSA Conference (San Francisco) – May 7, 2024 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and best p...

The Narrow Escape from the xz Disaster

Blog Published: 05/07/2024

Originally published by Dazz.Written by Tomer Schwartz, Co-founder & CTO, Dazz.In the intricate world of software supply chain, the recent near-miss incident with CVE-2024-3094–the xz/liblzma backdoor–serves as a potent reminder of our system's fragility and the constant vigilance required to...

Enterprise Management Associates Names Cloud Security Alliance as a Cutting-Edge Security Exhibitor in Its Vendor Vision 2024 Report for RSA

Press Release Published: 05/07/2024

CSA was the only nonprofit to be named in the reportSAN FRANCISCO (RSA Conference) – May 7, 2024 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment, is please...

Is Managed Kubernetes the Right Choice for My Organization?

Blog Published: 05/07/2024

Originally published by Tenable. Written by Mark Beblow. Many enterprises have adopted container technology because it helps them to streamline the building, testing and deploying of applications. The benefits of container technology include better resource efficiency, portability, consistency ...

Cyber Defense Magazine Names Cloud Security Alliance’s Certificate of Competence in Zero Trust (CCZT) a 2024 Global InfoSec Award Winner for Cutting-Edge Cybersecurity Training

Press Release Published: 05/06/2024

CCZT helps security professionals build knowledge to drive the definition, implementation, and management of Zero TrustSAN FRANCISCO (RSA Conference) – May 6, 2024 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and best pract...

The Anatomy of an ALPHA SPIDER Attack

Blog Published: 05/06/2024

Originally published by CrowdStrike.ALPHA SPIDER is the adversary behind the development and operation of the Alphv ransomware as a service (RaaS).Over the last year, ALPHA SPIDER affiliates have been leveraging a variety of novel techniques as part of their ransomware operations.CrowdStrike Serv...

Resource Constraints in Kubernetes and Security

Blog Published: 05/06/2024

A Practical GuideOriginally published by Sysdig.Written by Nigel Douglas.The Sysdig 2024 Cloud‑Native Security and Usage Report highlights the evolving threat landscape, but more importantly, as the adoption of cloud-native technologies such as container and Kubernetes continue to increase, not a...

Cloud Security Alliance Releases Three Papers Offering Guidance for Successful Artificial Intelligence (AI) Implementation

Press Release Published: 05/06/2024

Report series charts course for responsible and secure development and deployment of AIRSA Conference (San Francisco) – May 6, 2024 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure clo...

12 Strategic Career Tips for Aspiring CISOs

Blog Published: 05/06/2024

Originally published by Abnormal Security.Written by Mike Britton.In the ever-evolving world of cybersecurity, the role of Chief Information Security Officer (CISO) has been firmly established as a critical position. And while the journey to becoming a CISO can be challenging, the destination is ...

CISOs, AI, and OT: A Balancing Act Between Innovation and Protection

Blog Published: 05/03/2024

Originally published by CXO REvolutionaries.Written by Ben Corll, CISO in Residence, Zscaler.In early 2024, I had the privilege of teaching a SANS leadership course in New Orleans. The food was amazing, as expected. What I didn't expect was the sheer number of operational technology (OT) security...

Post-Quantum Preparedness

Blog Published: 05/03/2024

Written by Ascertia.The world of cryptography is on the cusp of a significant change. Quantum computers, once thought of as mere science fiction, are rapidly becoming a reality. While widespread availability of these powerful machines might not be imminent, their potential to break current crypt...

Business Risks Explored: Practical Insights for Resilience

Blog Published: 05/03/2024

Written by the AuditCue Content Team. The COVID-19 pandemic serves as a prime example of external risks faced by companies, causing disruptions in supply chains, declines in demand, and government-mandated closures. However, some companies were able to adapt and innovate in response to the pan...

Automation is Key: DHS Report Unveils Lessons from the Microsoft Exchange Incident

Blog Published: 05/02/2024

Originally published by Oasis Security.Written by Amit Zimerman, Co-founder & CPO, Oasis Security.Last week, the DHS Cyber Safety Review Board, established by President Biden, released a scathing report exposing critical oversights by Microsoft that enabled the targeted cyberattack by Chinese...

Microsoft Copilot for Security: Everything You Need to Know

Blog Published: 05/02/2024

Originally published by Reco.Written by Gal Nakash.What is Microsoft Copilot for Security?‍Microsoft Copilot for Security is an innovative component of the Microsoft security product portfolio. It is essentially engineered to redefine the management of security incidents. This solution is deeply ...

Defining Cloud Key Management: 7 Essential Terms

Blog Published: 05/01/2024

In the realm of cloud security, understanding key management is paramount to safeguarding sensitive data. Encryption, key generation, and access control help ensure that sensitive information remains unreadable and inaccessible to unauthorized parties. Without a thorough understanding of cloud ke...

Livin' on the Edge: Linux's Impact on Computing

Blog Published: 05/01/2024

Originally published by Automox.SummaryThis episode of the CISO IT podcast explores the history and importance of Linux.Automox CISO Jason Kikta shares his personal experience with Linux and highlights its advantages and innovations. The conversation also touches on the changing attitudes towards...

Navigating the Cloud – Beyond “Best Practices”

Blog Published: 05/01/2024

Originally published by Cloud Computing Consultants.Cloud migrations are complex. Rapidly evolving technology, team culture changes, and changing architectural requirements leave companies seeking options to alleviate their cloud migration paths. As a result, businesses are bombarded with a slew ...

How DSPM Can Help Solve Healthcare Cybersecurity Attacks

Blog Published: 04/30/2024

Originally published by Cyera.Healthcare organizations face rising cybersecurity threats looking to exfiltrate patient data. This article explores major healthcare data breaches, the value of stolen medical info, and how data security posture management (DSPM) solutions provide comprehensive data...

Considerations When Including AI Implementations in Penetration Testing

Blog Published: 04/30/2024

Originally published by Schellman.Did you recently implement a new artificial intelligence (AI) feature within your application and now your customers are starting to ask for AI-specific penetration tests? Are you curious as to how an assessment like that would work? As with all these exercises, ...

Your Ultimate Guide to Security Frameworks

Blog Published: 04/29/2024

Originally published by Vanta.Trust is a vital part of any growing business. A part of earning and keeping the trust of your customers is implementing the right security measures to protect their data and your systems from any breaches that could impact them. By aligning with industry-vetted secu...

Looking for the CCM?

Start using the Cloud Controls Matrix to simplify compliance with multiple standards & regulations.