A Business Guide to…Protecting Personal Information on Social Media
Blog Published: 07/30/2025
Written by Abel E. Molina, Cybersecurity Architect, Softchoice. Today almost every business maintains a presence on social media. Platforms like Facebook, Instagram, Twitter, and LinkedIn are powerful tools for reaching new customers, building brand awareness, and stay...
Quishing is Here, and It’s Hiding in Plain Sight
Blog Published: 07/31/2025
Written by David Balaban. I still remember when QR codes were novelty tech – quirky black-and-white boxes printed on event flyers or hidden on product packaging, waiting to be scanned for a quick surprise. These days, though, that innocent square can be a silent predator. Walk i...
The Hidden Cost of Trust: New Data Reveals Alarming Employee Engagement with Vendor Email Compromise
Blog Published: 08/01/2025
Originally published by Abnormal. Written by Callie Baron. Your workforce is your greatest asset, and your vendors are integral to the success of the enterprise. It's no surprise, then, that cybercriminals are targeting both, exploiting the trust in these partnerships to deceiv...
Jurassic Access: What Jurassic Park Teaches Us About Identity and Access Management
Blog Published: 08/01/2025
This weekend, I watched Jurassic Park for the first time, and while most people might walk away from the film seeing it as a cautionary tale about the dangers of unchecked scientific ambition and the unpredictability of life, the cybersecurity professional in me saw something else entirely. I...
Inadequate Database Security: A Case Study of the 2023 Darkbeam Incident
Blog Published: 08/04/2025
CSA’s Top Threats to Cloud Computing Deep Dive 2025 reflects on eight recent real-world security breaches. The report presents the narrative of each incident, as well as the relevant cloud security risks and mitigations. Today we’re reflecting on the fifth incident covered in the Deep Dive: ...
The Ethical and Societal Considerations of an AI Impact Analysis
Blog Published: 08/05/2025
Originally published by Schellman. Written by Charles Goss, SOC Senior Associate, Schellman. The use of artificial intelligence is rapidly expanding across businesses and industries, driving innovation, improving efficiency, and unlocking new opportunities. However, as AI ...
Drift Happens: Why Continuous IaC Validation is Non-Negotiable
Blog Published: 08/05/2025
Alright, let's talk about promises. Infrastructure as Code (IaC) – Terraform, CloudFormation, you name it – promised us the holy grail: consistent, repeatable, controlled environments. And honestly? For the most part, it delivered. We waved goodbye (mostly) to snowflake servers and configurat...
Are Your Hypervisors SOC 2 Ready? Why Virtualization Security is Crucial for Compliance
Blog Published: 08/06/2025
Originally published by Vali Cyber. As virtualization continues to shape enterprise IT environments, hypervisors have become foundational to infrastructure operations. But their central role also makes them a high-value target for cyber attackers. This blog explores how aligning hy...
The Treasury Access Incident: Five Critical Lessons for Modern Identity Security
Blog Published: 08/06/2025
Executive Summary The recent Treasury Department breach, caused by unauthorized access privileges, highlights the persistent risks organizations face with identity security and access governance. This breach was not the result of an advanced cyberattack but rather stemmed from simple misco...
Announcing RiskRubric.ai: A Clear Scorecard for Every AI Model
Blog Published: 08/04/2025
Originally published on RiskRubric.ai. As data science and AI engineering teams mix general purpose LLMs from foundation model developers with dozens of specialist models like Mistral and Qwen, they leave their security leaders asking: “Can I trust this model for my data and my ...
From Aware to Actionable: Closing the Cloud Security Resilience Gap
Blog Published: 08/07/2025
At a period when cloud adoption is at an all-time high and the attack surface continues to expand, most organizations still have not turned cybersecurity awareness into action. According to PwC’s 2025 Global Digital Trust Insights, only 2% of businesses have implemented cyber resilience me...
Strategic Implementation of the CSA AI Controls Matrix: A CISO's Guide to Trustworthy AI Governance
Blog Published: 08/08/2025
The rapid proliferation of generative artificial intelligence (GenAI) across enterprise environments has created an unprecedented governance challenge for Chief Information Security Officers (CISOs) and GRC professionals. Traditional cybersecurity frameworks, while foundational, are insuff...
The Missing Piece in GRC
Blog Published: 08/11/2025
In our last post, we explored how the governance, risk, and compliance (GRC) landscape is evolving and how AI is reshaping its future. This next phase is what we call GRC 4.0. While Generative AI (GenAI) has been around for years, its widespread accessibility has only taken off recently, ...
Visibility ≠ Security: The SaaS Illusion That’s Putting Enterprises at Risk
Blog Published: 08/12/2025
The SaaS security reality check: What 800+ security leaders revealed about the true state of SaaS risks. At first glance, the SaaS story looks great: Dashboards are green, audits are clean, and executives feel safe. But dig a little deeper, and a different picture emerges. AppOmni’s 2025 ...
Cloud Security Alliance Names Google Cloud as First Company to be Valid-AI-ted, Setting New Benchmark for Data-driven Cloud Assurance
Press Release Published: 08/04/2025
Milestone recognizes Google Cloud’s leadership in transparent and trusted cloud computing services SEATTLE – August 4, 2025 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure clou...
Sunsetting Circle: Where CSA Communities Are Headed and How to Join
Blog Published: 08/07/2025
The Cloud Security Alliance (CSA) is evolving in how we connect, collaborate, and engage with our community. Over the past few years, our Circle community has served as a central hub for working groups, chapters, and training communities. While it’s been a valuable platform, we’re moving...
How to Secure and Manage Virtualized IT Environments the Right Way
Blog Published: 08/13/2025
Originally published by Reemo. Virtualization brings undeniable flexibility and scalability to IT infrastructures. However, these advantages come with significant risks if security and management practices are not modernized accordingly. Virtualized Environments: Specific ...
Why You Should Say Goodbye to Manual Identity Processes
Blog Published: 08/13/2025
As revealed in Cerby’s 2025 Identity Automation Gap Report, 46% of security and IT leaders say their organization has already experienced a security, compliance, or operational issue directly caused by manual identity workflow execution. Why do manual identity workflows continue to exist...
Assets Under Attack: Email Threats Targeting Financial Services Jump 25%
Blog Published: 08/14/2025
Money talks—and cybercriminals are listening. The financial services (FinServ) industry is becoming an increasingly popular target for advanced email attacks, as a single successful breach can unlock millions in assets and compromise the financial security of countless individuals. As artif...
Looking Back on a Successful Social Engineering Attack: Retool 2023
Blog Published: 08/18/2025
CSA’s Top Threats to Cloud Computing Deep Dive 2025 reflects on eight recent real-world security breaches. The report presents the narrative of each incident, as well as the relevant cloud security risks and mitigations. Today we’re reflecting on the sixth incident covered in the Deep Dive: ...