NISTIR 8547: From PQC Standards to Real-World Implementations
Blog Published: 03/20/2025
How and when you should switch to post-quantum Written by Cory Missimore of the CSA Quantum-Safe Security Working Group. Reviewed by Bruno Huttner, Mehak Kalsi, and Mahesh Adulla. NIST is helping companies and governments prepare for PQC As quantum computing techno...
AI Agents in 2025: The Next Frontier of Corporate Success
Blog Published: 03/21/2025
Originally published by Koat. What is an AI Agent? AI agents are advanced autonomous systems designed to perform specific tasks, make decisions, and collaborate with humans and other AI systems. Unlike traditional automation tools, they have machine learning, natural language proce...
Strengthening Cybersecurity in Healthcare: Newly Proposed HIPAA Rules to Include Pentesting
Blog Published: 03/21/2025
Originally published by Synack. New year, new regulations. In late December 2024, the U.S. Department of Health and Human Services (HHS) issued a proposal to modify the Health Insurance Portability and Accountability Act’s (HIPAA) Security Rule, with an overarching goal of stren...
Threat Modeling OpenAI's Responses API with the MAESTRO Framework
Blog Published: 03/24/2025
Written by Ken Huang, CEO of DistributedApps.ai, CSA Fellow, Co-Chair of CSA AI Safety Working Groups. OpenAI has ushered in a new era of AI capabilities with its latest release: the Responses API. This isn't just another incremental update; it represents a fundamental shift towa...
Zero Trust Makes Cybersecurity Everyone's Responsibility
Blog Published: 03/25/2025
Originally published by Illumio on October 14, 2024. Written by Gary Barlet, Public Sector CTO. Last month, news broke that senior Navy leaders aboard the USS Manchester were running a secret, unauthorized WiFi network on the ship. They only used the network to check sport...
Building a Robust Data Security Maturity Model
Blog Published: 03/26/2025
Written by Suresh Kumar Akkemgari, Hyland Software. Introduction In today's digital world, cyber threats challenge governments, business, critical infrastructure, and individuals. As these threats grow more frequent and complex, organizations must enhance their security measure...
Rethinking Data Risk in the AI Era: Why Organizations Need a Unified Approach
Blog Published: 03/26/2025
Originally published by BigID. The landscape of data security, privacy, and compliance has fundamentally changed. The explosive growth of data, the rapid adoption of AI, and an evolving threat landscape have outpaced traditional security measures. Organizations are now confronted wit...
AI Software Supply Chain Risks Prompt New Corporate Diligence
Blog Published: 03/31/2025
Originally published by CXO REvolutionaries. Written by Christopher Jablonski, Contributor, Zscaler. AI code is already a challenge to secure, but the arrival of autonomous or agentic AI will mean even greater difficulty. If your organization is using generative AI, you may w...
Unifying Governance and Security with an Application Fabric
Blog Published: 03/31/2025
Written by Eric Olden, CEO and Co-founder, Strata Identity. Originally published on Forbes. Managing applications across distributed IT environments is a significant and costly challenge for modern enterprises. As companies move to the cloud and expand through digital transform...
Hybrid Work: Navigating Security Challenges in the Modern Enterprise
Blog Published: 03/24/2025
Originally published by Reemo. Hybrid work has emerged as a dominant organizational model, with a significant portion of the global workforce embracing this flexible approach. While it offers numerous benefits, it also introduces complex security challenges that organizations must add...
How To Transform Your GRC with Continuous Controls Monitoring
Blog Published: 03/26/2025
Originally published by RegScale. Overwhelmed audit teams. Lengthy control processes. Increased regulatory scrutiny. Today, organizations are facing mounting pressure to strengthen their security posture while managing an ever-expanding web of compliance requirements. M...
Hybrid Cloud Security – Top Challenges and Best Practices
Blog Published: 03/27/2025
Originally published by InsiderSecurity. The increasing prevalence of digital transformations in businesses has led to a global surge in cloud adoption. Many companies are now opting for a hybrid cloud model, which combines private and public cloud services to harness the advantages o...
SaaS Security and IaaS Security—Why You Need Both
Blog Published: 03/27/2025
Originally published by Valence. Written by Jason Silberman. The rapid adoption of cloud computing over the past decade SaaS (Software-as-a-Service) and IaaS (Infrastructure-as-a-Service) has revolutionized how businesses operate. However, with this transformation come...
MFT and AI: Why Secure Data Movement is Critical for AI Success
Blog Published: 04/02/2025
Originally published by Axway. Written by Meetesh Patel, Vice President and General Manager, Managed File Transfer, Axway. With the ever-increasing discussion about AI, the challenges many enterprises face in harnessing its potential are becoming more apparent. &nb...
What Is IT Compliance? Definition, Guidelines, and More
Blog Published: 04/03/2025
Originally published by RegScale. Written by Travis Howerton. IT Compliance: A Definition Picture yourself walking through a factory with visible safety protocols: workers wearing hard hats, hazard signs up on the walls, and equipment being regularly inspected. That’s physical...
DeepSeek: Behind the Hype and Headlines
Blog Published: 03/25/2025
Written by Kurt Seifried, Chief Innovation Officer, CSA. The Story That Shook the Markets In January 2025, a relatively unknown Chinese AI company called DeepSeek burst onto the global stage with a bold claim—they had built advanced AI models that matched or exceeded the ...
Best Practices for Deleting Information After Employee Offboarding
Blog Published: 04/04/2025
Written by David Balaban. Staff records often contain sensitive content like personal identifiers and company-related communications. If this data is not properly cleared, it can result in compliance issues and unauthorized access. A systematic method guarantees that all digital...
Leveraging Containerization and Remote Browser Isolation
Blog Published: 04/07/2025
Originally published by Reemo. In an era defined by increasing digital interactions and a sophisticated cyber threat landscape, the security of user access to applications has become paramount for organizations. This report delves into the critical role of containerization and Re...
How Information Technology, Security, and Data Teams Can Help Businesses Rock the AI Revolution
Blog Published: 04/09/2025
Originally published by BigID. Written by Boyd White, Sr. Solutions Engineer, BigID. Unless you’ve been living under a rock for the last two years, you’ve probably noticed how Artificial Intelligence (AI) has gone from a futuristic buzzword to something even yo...
A Guide On How AI Pilot Programs are Shaping Enterprise Adoption
Blog Published: 03/28/2025
Written by Koat.ai. The First Flight into AI Initiatives In the ever-evolving landscape of business, AI Pilot Programs offer a structured approach for companies to harness the potential of artificial intelligence. These initiatives provide a testing ground where bus...