Roadmap to Agentic AI Implementation
Blog Published: 06/02/2025
Written by Dr. Chantal Spleiss of the CSA AI Governance and Compliance Working Group. Imagine there's no error It's easy if you try No conflict in the circuits Just agents standing by Imagine all the agents Talking all the time... Imagine there's no failure It isn’t hard ...
A Data-Driven Look at the Top Security Tools for Startups
Blog Published: 06/03/2025
Originally published by Vanta. Written by, Brian Kuan, Product Marketing Manager. As a startup founder, security might not be the first thing on your mind. You’re busy building features, finding product-market fit, and growing your customer base. But security isn’t just a nice to ha...
Unlocking Dynamic Security with Event-Driven Identity
Blog Published: 06/04/2025
Written by Gerry Gebel, Strata. In today’s evolving digital landscape, identity systems have advanced rapidly. We’ve moved from traditional passwords to passkeys, and from siloed architectures to integrated ecosystems of users, devices, and applications. It’s an exciting time—bu...
LLMs Writing Code? Cool. LLMs Executing It? Dangerous.
Blog Published: 06/03/2025
Written by Olivia Rempe, Community Engagement Manager, Cloud Security Alliance. There’s no denying it—Large Language Models (LLMs) have changed the game for software development. They can autocomplete boilerplate, refactor legacy functions, and even generate entire microse...
4 Mindset Shifts for Making Zero Trust Work in the Real World
Blog Published: 06/04/2025
Originally published by Cerby. Written by John Kindervag. Zero Trust has become one of the cybersecurity world’s most misunderstood buzzwords. In theory, it’s simple: never trust, always verify. In practice, it’s often reduced to a check-the-box product deployment or a single v...
The Dawn of the Fractional Chief AI Safety Officer
Blog Published: 06/04/2025
Written by Candy Alexander & Jim Reavis. Many organizations are realizing the benefits of leveraging “fractional” leaders in their C-suites. The ability to work with individuals with deep-seated expertise on an “as needed” basis, whether it is a few hours a week or more hour...
What Makes a Secure Cloud MFT Solution?
Blog Published: 06/05/2025
Originally published by Axway. Written by Paul Lavery, VP, Product Line for Managed File Transfer (MFT), Axway. It’s not an overstatement that secure data and file transfers are a top priority virtually everywhere today. 2023 saw the discovery of 15 critical vulnerabilities, wi...
Make Tech Changes Fun for End Users and Off-the-Chart Adoption Will Follow
Blog Published: 06/06/2025
Originally published by CXO REvolutionaries. Written by Jay Patty, CTO in Residence, Zscaler. Inject humor and creativity into your communications strategy to smooth changes. Technology changes are inevitable, but user adoption isn’t. Your IT team likely struggles to get...
How Zero Trust Can Save Your Business from the Next Big Data Breach
Blog Published: 06/06/2025
Written by Bhavya Jain. A data breach refers to any incident where sensitive or confidential information—like login credentials, banking details, or private corporate files—is accessed, leaked, or stolen by unauthorized parties. Such incidents can arise from cyberattacks like p...
In the Beginning, Before Zero Trust
Blog Published: 06/06/2025
Written by Christer Swartz, Director Industry Solutions, Illumio. I entered the cyber industry a long time ago, when I joined a small startup, way back in the year 1989. Back then, our global headcount was 50 people, and we called ourselves cisco systems (when “Cisco” was still ...
When Good GPTs Go Bad: How Trusted AI Tools Are Exploited for Attacks
Blog Published: 06/05/2025
Originally published by Abnornal. Written by Callie Baron. Malicious AI is rewriting the rules of cybercrime. Learn how traditional GPTs are being exploited and why security teams need to act now. Artificial intelligence is changing everything—fast. What once felt like science...
Ransomware in the Education Sector
Blog Published: 06/05/2025
Originally published by Vali Cyber. Written by Chris Goodman. In recent years, educational institutions have been relentlessly targeted by cyberattacks, with hypervisor vulnerabilities standing out as one of the most critical risks. As remote learning has expanded, academi...
The 2024 Football Australia Data Breach: A Case of Misconfiguration and Inadequate Change Control
Blog Published: 06/09/2025
CSA’s Top Threats to Cloud Computing Deep Dive 2025 reflects on eight recent real-world security breaches. The report presents the narrative of each incident, as well as the relevant cloud security risks and mitigations. Today we’re taking a closer look at the second incident covered in the D...
The AI Trust Imperative: Why the CSA AI Trustworthy Pledge Matters Now More Than Ever
Blog Published: 06/12/2025
Written by Daniele Catteddu, Chief Technology Officer, CSA. Many of us have witnessed firsthand the transformative power of artificial intelligence and the urgent need for responsible innovation that keeps pace with technological advancement. The artificial intelligence revo...
Runtime Integrity Measurement Overview
Blog Published: 06/13/2025
Originally published by Invary. Written by Dr. Wesley Peck. Runtime Integrity Measurement In this article we’ll dive into the technical details of a real world rootkit, explore how that rootkit compromises an operating system, and then learn how Kernel Integrity Measurement t...
Agentic AI is Redefining Identity Security in the Cloud
Blog Published: 06/09/2025
Originally published by Britive. The emergence of agentic AI is rapidly reshaping how modern enterprises think about automation, autonomy, and security. Unlike traditional generative AI, which focuses on creating content or identifying patterns, agentic AI represents a more proa...
Cloud Security Alliance Marks a New Chapter in AI Governance with the AI Trustworthy Pledge
Press Release Published: 06/11/2025
Pledge identifies those organizations truly committed to responsible, trustworthy AI SEATTLE – June 11, 2025 – The AI revolution is reshaping every sector of our economy. But even as AI systems are making decisions that affect millions of lives, organizations are grappling with a host of i...
Why Early Adoption of ISO 42001 Matters
Blog Published: 06/10/2025
Originally published by A-LIGN. As AI governance grows in importance, many organizations are planning for compliance. The 2025 Compliance Benchmark Report, which gathered insights from over 1000 compliance professionals across various industries, found that 76% of organizations...
How to Stop Expired Secrets from Disrupting Your Operations
Blog Published: 06/10/2025
Originally published by Aembit. Written by Dan Kaplan. You and your team have just received that dreaded late-night alert: “Authentication failure in production.” Your team’s carefully built service is down, not because of a sophisticated ransomware attack or some complex virus...
Cloud Security Alliance’s AI Safety Initiative Named a 2025 CSO Awards Winner
Press Release Published: 06/12/2025
Program recognized for driving innovation and strategic vision SEATTLE – June 12, 2025 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment, is excited to...