Cloud Security Alliance Brings AI-Assisted Auditing to Cloud Computing
Press Release Published: 06/11/2025
Valid-AI-ted provides an automated quality check of STAR Level 1 self-assessments using state-of-the-art LLM technology SEATTLE – June 11, 2025 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and best practices to help en...
Boost Cloud Security Without Bugging Your Developers
Blog Published: 06/11/2025
Originally published by CyberArk. Written by Brooke Jameson, Senior Product Marketing Manager, CyberArk. Developers are incredibly valuable to an organization’s progress and evolution. They must innovate quickly while simultaneously navigating changes to their day-to-day o...
Valid-AI-ted: A Major Step Towards Real-Time Cloud Assurance
Blog Published: 06/11/2025
Written by Jim Reavis, CEO & Co-Founder, Cloud Security Alliance. Today, at our Cloud Trust Summit, we officially launched Valid-AI-ted, the industry’s first AI-assisted quality check for STAR Level 1 self-assessments. Within hours of opening the submission portal, providers w...
Closing the Blind Spot in Enterprise DNS Security: Why DNS Posture Management Matters
Blog Published: 06/12/2025
Originally published by CheckRed. Written by Derek Hammack, VP, Operations and Customer Success, CheckRed. As enterprise security teams work to protect sprawling multi-cloud environments, one foundational layer remains dangerously underprotected: the Domain Name System (D...
Implementing CCM: Interoperability & Portability Controls
Blog Published: 06/13/2025
The Cloud Controls Matrix (CCM) is a framework of controls that are essential for cloud computing security. The CCM is created and updated by CSA and aligned to CSA best practices. You can use CCM to systematically assess and guide the security of any cloud implementation. CCM also provides...
Why Your SaaS Security Strategy Needs Automated Remediation
Blog Published: 06/16/2025
Originally published by Valence Security. Written by John Filitz. Your security team is operating with a dangerous blind spot. Your SaaS environment is likely the most vulnerable aspect of your security posture due to unremediated and escalating cyber risk. Even if you're...
AI Agents vs. AI Chatbots: Understanding the Difference
Blog Published: 06/16/2025
Originally published by Astrix. Written by Alon Berger. While AI chatbots respond, AI agents act. Both automate tasks, but the security implications differ significantly, primarily due to how they interact with NHIs. Agents make autonomous decisions, through adaptive learning, ...
NIST AI RMF: Everything You Need to Know
Blog Published: 06/17/2025
Originally published by Vanta. Written by the Vanta team. The NIST AI Risk Management Framework (RMF) is one of the most advanced, globally accepted guidelines for the safe and responsible use of AI systems. If your organization implements AI in any capacity, adopting the ...
ISO 27001 Certification: How to Determine Your Scope
Blog Published: 06/18/2025
Originally published by Schellman. Written by Jenelle Tamura, Senior Associate, Schellman. When building out your information security management system (ISMS) which will ultimately become certified, it can be tricky to know where to draw the boundaries of what should be includ...
Why Do I Have to Fill Out a CAIQ Before Pursuing STAR Level 2 Certification?
Blog Published: 06/17/2025
Written by John DiMaria, Chief of Staff, CSA. The STAR (Security, Trust, Assurance and Risk) program by the Cloud Security Alliance (CSA) is a globally recognized framework for assessing the security posture of cloud service providers (CSPs). The program provides a structured pa...
How to Keep IAM Running in a Multi-Cloud World
Blog Published: 06/18/2025
Written by Eric Olden, Strata. Why identity is more than just access As the digital landscape rapidly shifts toward Zero Trust architectures, identity has taken on a much more critical role. Once a mechanism for simple verification, identity is now central to enterprise securit...
Protecting the Weakest Link: Why Human Risk Mitigation is at the Core of Email Security
Blog Published: 06/20/2025
Originally published by Abnormal. Written by Jade Hill. Blame has long been placed on people as the biggest vulnerability in cybersecurity. And while it isn’t exactly a hot take, I deeply believe that we can’t blame people for just trying to do their jobs, track a package,...
6 Cloud Security Trends Reshaping Risk and Resilience Strategies
Blog Published: 06/20/2025
Originally published by Seiso. Written by Eric Lansbery, Chief Operating Officer, Seiso. Cloud security isn’t failing—it’s being outpaced. Attackers have adapted faster than many security programs have matured. As organizations accelerate cloud architecture adoption...