7 Common Causes of Data Breach: Safeguarding Your Digital Assets
Blog Published: 04/18/2024
Originally published by InsiderSecurity.Data Breaches are an ever-present threat to enterprises in today’s connected world. Whether you are a small SME or a large multinational company, the risk of a data breach and the company becoming another headline is a constant concern for senior management...
How to Set Your Small Privacy Team Up for Success
Blog Published: 04/17/2024
Originally published by Schellman.Amidst the evolving patchwork of data protection and privacy legislation in the United States, privacy remains a top priority for organizations. But protecting privacy also requires resources, and while not all organizations have that much to spare, it is possibl...
10 Tips to Guide Your Cloud Email Security Strategy
Blog Published: 04/17/2024
Originally published by Abnormal Security. Written by Lane Billings. As enterprises have migrated to Microsoft 365 and Google Workspace, they’ve seen the perks: easy collaboration, greater agility, and lower costs.But for most organizations, the challenge of determining how to keep data protected...
Cloud Security Alliance (CSA) AI Summit at RSAC to Deliver Critical Tools to Help Meet Rapidly Evolving Demands of AI
Press Release Published: 04/17/2024
Event to provide attendees with a holistic understanding of AI’s future along with pragmatic advice on managing risks and gaining benefits from generative AI SEATTLE – April 17, 2024 – This year, the Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, ...
The Widening Overlap Between Cloud Workloads and Cybersecurity
Blog Published: 04/17/2024
Written by David Balaban.There’s no denying that the cloud has revolutionized the way businesses operate, offering on-demand scalability, greater agility, and reduced IT infrastructure costs. To the average organization, a shift from on-prem to cloud-based is truly a quantum leap in terms of bene...
The Data Security Risks of Adopting Copilot for Microsoft 365
Blog Published: 04/16/2024
Originally published by Cyera.Written by Leo Reznik. Microsoft is taking the lead when it comes to AI-powered ecosystems. The company’s newly introduced Copilot AI assistant for Microsoft 365 surfaces organizational data to deliver users a seamless workflow experience. However, with lots of data ...
How to Audit Your Outdated Security Processes
Blog Published: 04/16/2024
Originally published by Vanta.As your business grows, there are new demands of the security team, like adding additional compliance frameworks, more security questionnaires, or new, advanced requirements from large enterprise customers.While this growth is exciting, it also comes with growing pa...
Cloud Relationships: Getting to Grips With the ‘Vendor of My Vendor’
Blog Published: 04/15/2024
Written by Thales.Over the course of centuries, we have learned a valuable lesson: building walls or burying treasure on shifting sand brings no advantages. This timeless wisdom can be applied to the present era, where businesses struggle to find the perfect storage solution for their data, which...
From Gatekeeper to Guardian: Why CISOs Must Embrace Their Inner Business Superhero
Blog Published: 04/15/2024
Originally published by CXO REvolutionaries.Written by Ben Corll, CISO in Residence, Zscaler.(And why it should become our outer superhero persona, too)Let's face it. The days of the CISO as the lone wolf, guarding the castle walls with a stack of firewalls and a suspicious glare, are over (thoug...
Cantwell Proposes Legislation to Create a Blueprint for AI Innovation and Security
Blog Published: 04/15/2024
Originally published by Truyo.Written by Dan Clarke.In 2024, a surge of global AI legislation is imminent, with the United States poised to follow the European Union’s lead by implementing comprehensive nationwide rules and guidelines. Senate Commerce Committee Chair Maria Cantwell is gearing up ...
Evaluate the Security of Your Cloud Service Provider with the CSA STAR Registry
Blog Published: 04/13/2024
The CSA STAR Registry is kind of a big deal in the cloud security world. It's a global database filled with over 2,000 assessments completed by cloud service providers (CSPs), documenting their security, privacy, and governance policies. Anyone can access the Registry for free to find cloud servi...
Sealing Pandora's Box - The Urgent Need for Responsible AI Governance
Blog Published: 04/12/2024
Written by MJ Schwenger, CSA AI Working Group.The explosive emergence of Generative AI, with its ability to create seemingly magical outputs from text to code, is undeniably exciting. However, lurking beneath this shiny surface lies a Pandora's box of potential risks that demand immediate attenti...
Protocols are Passé. APIs are Key for Effective Zero Trust Implementation.
Blog Published: 04/12/2024
Written by Chandra Rajagopalan, Principal Software Engineer, Netskope. A really short reminiscence of network and security protocolsFrom the 1970s to the 2000s, creating new protocols and enhancing the protocols was prevalent among networking and security experts. These protocols influenced the w...
Remote Code Execution (RCE) Lateral Movement Tactics in Cloud Exploitation
Blog Published: 04/12/2024
Originally published by Uptycs.When it comes to cybersecurity, Remote Code Execution (RCE) might sound complex, but in essence, it's a straightforward concept with profound implications. Among the myriad of security vulnerabilities, RCEs are particularly alarming due to their high impact and the ...
Cloud Gaming and Data Security: Balancing Fun and Privacy
Blog Published: 04/12/2024
Written by Ashwin Chaudhary, CEO, Accedere.Cloud gaming, also known as game streaming, has revolutionized the gaming industry. It allows players to enjoy high-quality games without the need for powerful local hardware. However, this convenience comes with its own set of security challenges. In ...
Building a SOC for Compliance
Blog Published: 04/11/2024
Originally published by RegScale.There are not many things I have hated in my professional life more than getting surprised in an audit. It is embarrassing, damages your credibility, and makes it harder to accomplish your strategic goals as you get distracted by fighting the small forest fires th...
Ensuring Trust and Compliance: The Importance of Accredited Auditors for ISO 27001
Blog Published: 04/11/2024
Originally published by BARR Advisory.Written by Cameron Kline, Director, Attest Services, BARR Advisory.As an internationally recognized certification, ISO 27001 is one of the most highly regarded and thorough cybersecurity assessments an organization can undergo. Achieving and maintaining an IS...
The Secret to Supercharging LLMs: It's Not Answers, It's Questions
Blog Published: 04/10/2024
Written by Dr. Chantal Spleiss, Co-Chair of the CSA AI Governance & Compliance Working Group.Stop talking to your AI, start collaborating with it. Prompt engineering is the key to unlocking the full potential of LLMs. This mastery of questioning is so valuable that a prompt engineer may earn ...
Securing Non-Human Identities: Lessons from the Cloudflare Breach
Blog Published: 04/10/2024
Originally published by Oasis Security. Written by Roey Rozi, Director of Solutions Architecture, Oasis Security. Cloudflare disclosed on February 2nd that it had been breached by a suspected nation-state attacker. This breach exploited multiple unrotated and exposed secrets. The chain of events ...
Why Cyber Defenders Should Embrace a Hacker Mindset
Blog Published: 04/10/2024
Originally published by Pentera. Written by Nelson Santos. Today’s security leaders must manage a constantly evolving attack surface and a dynamic threat environment due to interconnected devices, cloud services, IoT technologies, and hybrid work environments. Adversaries are constantly introduci...