Why Identity Is the Cornerstone of Zero Trust Architecture
Blog Published: 10/16/2025
Introduction Imagine giving a stranger your house keys just because they walked past your driveway. That’s effectively what many organizations still do—granting implicit trust to users or systems based on network location. Zero Trust flips this model on its head by treating every ...
What to Know About the EU AI Code of Practice
Blog Published: 10/20/2025
As the need for innovative artificial intelligence grows, regulatory bodies are working quickly to create frameworks that balance acceleration with safety, accountability, and trust. Notably, the European Union’s AI Act is poised to reshape how organizations approach AI governance, especial...
How to Improve Risk Management with an Application Fabric
Blog Published: 10/21/2025
With enterprise applications increasingly distributed across on-premises data centers, cloud environments, and SaaS platforms, this fragmentation makes it difficult to secure access, govern usage, and manage compliance. As the application footprint grows, so does risk. For example, mergers ...
Using an LLM as a Judge
Blog Published: 10/28/2025
What is using an LLM as a judge? Using an LLM as a judge is the practice of using a large language model to evaluate the quality of AI-generated content, essentially letting one model serve as the “judge” of another model’s output. At its core, using an LLM as a judge involves leveraging t...
Science Stymied by Spreadsheets? Modernizing DOE Compliance
Blog Published: 10/23/2025
The National Laboratories of the Department of Energy stand at the forefront of scientific innovation, tackling complex challenges and advancing research across the world. But behind these groundbreaking discoveries lies a less glamorous reality: the overwhelming number of compliance processe...
Passwordless Authentication - A Digital Trust Transformation in Combating Credential-Based Attacks
Blog Published: 10/29/2025
Passwordless Authentication is becoming more relevant in the modern era of digital security by offering organizations a strong defence against credential based cyber-attacks that have always been the most prevalent cause for data breaches. In this article we will explore how passwordless tec...
SASE: Securing the New Enterprise Perimeter with Zero Trust
Blog Published: 10/27/2025
The definition of enterprise security has evolved beyond recognition. Traditionally enterprises used to secure their applications, data and users within their physical locations from external threats. However, enterprise boundaries have moved beyond these physical walls due to emergence of em...
Hypervisor Security in Finance: Why Virtual Infrastructure is a Growing Ransomware Target
Blog Published: 10/30/2025
Written by Chris Goodman, Vali Cyber. Imagine a financial institution where all virtual machines—responsible for everything from customer transactions to trade executions—suddenly go dark. Operations freeze, data is locked, and millions are at stake. This is no hypothetical scenario; i...
Building an AI Native Engineering Organization: Lessons in Speed, Culture, and Security
Blog Published: 10/29/2025
Not long ago, I led the transformation of a fast moving technology company’s engineering organization. Our goal was to move from a traditional, high functioning team to one built entirely around AI native principles. It didn’t begin with a sweeping strategy. It started with uncomfortable ex...
Regulatory Reckoning: The Hidden Cost of an Immature Compliance Program
Blog Published: 10/30/2025
Remember when it was enough for companies just to have a compliance program, any compliance program? Those days are over. Permanently. Today, organizations face mounting pressure to demonstrate not bare-bones compliance but full maturity in their approach to managing regulatory requirement...
Implementing CCM: Incident Response Controls
Blog Published: 10/14/2025
The Cloud Controls Matrix (CCM) is a framework of controls that are essential for cloud computing security. Created by CSA, the CCM aligns with CSA best practices. You can use CCM to systematically assess and guide the security of any cloud implementation. CCM also provides guidance on whic...
New Study from Cloud Security Alliance Finds AI Improves Analyst Accuracy, Speed, and Consistency in Security Investigations
Press Release Published: 10/07/2025
Security operations center (SOC) analysts assisted by AI are faster and more accurate compared to counterparts working manually SEATTLE – Oct. 7, 2025 – Beyond the Hype: A Benchmark Study of AI in the SOC, a new report from the Cloud Security Alliance (CSA), the world’s leading not-for-pro...
Secure Use of the Agent Payments Protocol (AP2): A Framework for Trustworthy AI-Driven Transactions
Blog Published: 10/06/2025
Written by Ken Huang, CEO at DistributedApps.ai and Jerry Huang, Engineering Fellow, Kleiner Perkins. Abstract AI agents used in e-commerce necessitates secure payment protocols capable of handling high-determinism user authorization, agent authentication, and non-repudia...
How Organizations Can Lead the Way in Trustworthy AI
Blog Published: 10/16/2025
Artificial intelligence is reshaping the world at a pace that few technologies have ever matched. From healthcare to customer support, AI systems now influence decisions with profound consequences. Yet alongside its promise, AI carries risks such as bias, hallucinations, privacy breaches, an...
AI-Integrated Cloud Pentesting: How LLMs Are Changing the Game
Blog Published: 10/24/2025
Cloud environments have become central to modern business operations, but their scale, complexity, and dynamic nature create significant security challenges. Traditional penetration testing methods, manual exploits, and scripted scans often struggle to cover rapidly evolving multi-cloud infr...
Introducing TAISE: The Trusted AI Safety Expert Certificate
Blog Published: 10/22/2025
Artificial intelligence is shaping the future of business, society, and daily life at an unprecedented pace. Yet, alongside innovation comes urgent responsibility: ensuring that AI systems are safe, secure, ethical, and resilient. CSA, together with Northeastern University, has created the T...
Quantum Heist? Not So Fast — How Financial Institutions Can Fight Back
Blog Published: 10/10/2025
Do you have a bank account, cryptocurrency, and/or any assets managed by a financial institution or bank? I bet you want the financial institutions that handle them for you to keep those assets safe from any threat, including, a Cryptographically Relevant Quantum Computer (CRQC) which is on t...
Cyber Threat Intelligence: AI-Driven Kill Chain Prediction
Blog Published: 10/20/2025
Written by: Ken Huang, Fellow and Co-chair of AI Safety Working Groups, CSA and CEO, DistributedApps.ai Monisha Dhanraj, CEO, Frondeur Labs Chitraksh Singh, AI Security Researcher, Frondeur Labs In this blog, we'll talk about KillChainGraph and what it's trying to a...
Implementing CCM: Supply Chain Management Controls
Blog Published: 10/24/2025
The Cloud Controls Matrix (CCM) is a framework of controls that are essential for cloud computing security. Created by CSA, the CCM aligns with CSA best practices. You can use CCM to systematically assess and guide the security of any cloud implementation. CCM also provides guidance on whic...
Calibrating AI Controls to Real Risk: The Upcoming Capabilities-Based Risk Assessment (CBRA) for AI Systems
Blog Published: 10/27/2025
Governing generative and agentic AI while enabling AI innovation at the same time can feel like whiplash. In the upcoming Cloud Security Alliance (CSA) whitepaper, we introduce the Capabilities-Based Risk Assessment (CBRA). This structured methodology for evaluating enterprise AI risk looks...