Cloud 101CircleEventsBlog
Register for CSA’s free Virtual Cloud Trust Summit to tackle enterprise challenges in cloud assurance.

All Articles

All Articles
How We Can Help Corporate Boards with Cybersecurity

Blog Published: 04/02/2024

Originally published by RegScale. Recently the Wall Street Journal featured an article titled Why Corporate Boards Need More Cybersecurity Experience, and it got me thinking about what we can do to help them; we can do a lot. What’s the situation you ask? According to the WSJ, “Directors currentl...

Cloud Security Alliance Artificial Intelligence (AI) Webinar Series Will Address Pivotal Cloud Computing Topics in Leadup to AI Summit at RSA

Press Release Published: 04/02/2024

Thought-leadership webinars to provide key insights on elevating organizations’ cybersecurity postureSEATTLE – April 2, 2024 – Throughout the month of April, the Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and best practices to ...

“Toxic Combinations” are Inadequate: A Case Study

Blog Published: 04/02/2024

Originally published by Skyhawk Security.Written by Chen Burshan, CEO, Skyhawk Security.Posture management has turned into an exercise in prioritization, but this hasn’t made us safer.If a Tree Falls in the Forest…We all know the adage, “If a tree falls in the forest and nobody is there to hear i...

UN AI Resolution, EU AI Act, and Cloud Security Alliance's Recent Efforts: Draft White Paper on AI Organizational Responsibility for Core Security

Blog Published: 04/01/2024

In a world where artificial intelligence (AI) is rapidly becoming an integral part of our lives, ensuring its secure and responsible development and deployment is more critical than ever. The Cloud Security Alliance (CSA) has taken a significant step forward in this direction with the release of ...

10 Essential Identity and Access Management (IAM) Terms

Blog Published: 03/30/2024

Identity and access management is kind of a big deal. People are working from anywhere and everywhere on all kinds of devices, so it's essential to know who's who in the digital world and to confirm that our digital communications are secure. If you’re just starting out on your IAM journey, don’t...

The Elephant in the Cloud

Blog Published: 03/29/2024

Originally published by Pentera.Written by Aviv Cohen.As much as we love the cloud, we fear it as well.We love it because cloud computing services of Amazon, Azure, and Google have transformed operational efficiency and costs, saving us money, time, and alleviating much of the IT burden. We also ...

Artificial Intelligence and Cybersecurity: What to Know Right Now

Blog Published: 03/29/2024

Originally published by Schellman.Similar to the way the launch of the first satellite, Sputnik, both introduced a new technology era—the space race—and raised some alarm, the ongoing adoption of generative artificial intelligence (AI) is beginning to permeate industries worldwide, prompting ques...

Security Compliance for Cloud Services

Blog Published: 03/29/2024

Written by Ashwin Chaudhary, CEO, Accedere. Cloud computing is a model for enabling on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management eff...

Beyond the Black Box: How XAI is Building Confidence

Blog Published: 03/28/2024

Written by Dr. Chantal Spleiss, Co-Chair for the CSA AI Governance & Compliance Working Group.While "AI" has become a broadly used word, there are key distinctions within AI to keep in mind. Narrow AI systems excel at specific tasks, like playing chess or recognizing objects in images. Genera...

How to Secure Business-Critical Applications

Blog Published: 03/28/2024

Originally published by CrowdStrike. As organizations move more of their business-critical applications to the cloud, adversaries are shifting their tactics accordingly. And within the cloud, it’s clear that cybercriminals are setting their sights on software applications: In fact, industry data ...

6 Surprising Findings from the CSA State of Security Remediation Report

Blog Published: 03/28/2024

Originally published by Dazz.Written by Julie O’Brien, CMO, Dazz.As more companies shift left and embrace hybrid cloud operations, the need for security visibility across the entire code-to-cloud environment is critical for staying on top of vulnerabilities and reducing exposure.The CSA State of ...

For Game-Changing Cloud Workload Protection, Focus on Quality Over Quantity

Blog Published: 03/27/2024

Written by Tenable Cloud Security. The infamous Log4J software vulnerability shook the software industry in 2021 by catching much of the IT security community unprepared. Log4J is used in nearly every modern application, so the flaw impacted enterprise cloud services globally. What is the preferr...

The 2023 State of SaaS Security Report

Blog Published: 03/27/2024

Originally published by Valence. Written by Adrian Sanabria. There’s something I love about putting together a big annual security report. The combination of data insights and industry trends is an opportunity to present a snapshot of the big picture. There’s the luxury of time we don’t have with...

Everything You Need to Know About the EU AI Act

Blog Published: 03/27/2024

Originally published by BARR Advisory.Written by Claire McKenna. We’ve recently witnessed the rapid expansion of artificial intelligence (AI)—and we can expect its continued integration into our daily lives. As our use and reliance on AI grows, so do the potential security risks that come along w...

5 Security Questions to Ask About AI-Powered SaaS Applications

Blog Published: 03/26/2024

Written by Wing Security.Artificial intelligence (AI) has emerged as a disruptive force, reshaping the way organizations operate, innovate, and compete. With enhanced efficiency, productivity, and personalized user experiences, AI-powered SaaS applications have become integral to modern businesse...

Powerful Cloud Permissions You Should Know: Part 1

Blog Published: 03/26/2024

Originally published by Sonrai Security.Written by Deirdre Hennigar and Tally Shea.MITRE ATT&CK Framework: Initial AccessA cloud permission is never a dangerous thing by nature. In fact, their power is solely defined by the context in which they are used. Whether a permission falls into the w...

Google Cloud’s CISO Phil Venables and Mandiant CEO Kevin Mandia to Headline Cloud Security Alliance AI Summit at 2024 RSA Conference

Press Release Published: 03/26/2024

Session will explore priorities for CXOs and Boards of Directors and offer actionable steps to implementing emerging technologiesSEATTLE – March 26, 2024 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and best practices to he...

Salesforce Data Security Challenges in Wake of the Recent Breach

Blog Published: 03/26/2024

Originally published by Adaptive Shield.Written by Hananel Livneh. Recent incidents continue to shed light on vulnerabilities that organizations face. A notable case involves a networking products company whose support website inadvertently exposed sensitive customer information, as reported by K...

Cybersecurity Frontiers: Unveiling CTI's Role in Mitigating Dark Web Risks

Blog Published: 03/25/2024

Written by Cetark. The dark web in the digital age presents a significant cybersecurity challenge. This secretive section of the internet, renowned for its anonymity, acts as a breeding ground for cyber threats. Nonetheless, Cyber Threat Intelligence (CTI) stands out as a beacon of hope, providin...

What Should the Scope Period Be for My SOC 2 Type 2 Report?

Blog Published: 03/25/2024

Originally published by MJD.Written by Mike DeKock, CPA, CEO, MJD.Q: What should the scope period be for my SOC 2 Type 2 report?A: MJD AnswerBefore I jump into the scope period for a SOC 2 Type 2, I wanted to quickly note the difference between a SOC 2 Type 1 report and a SOC 2 Type 2 report. Typ...

Looking for the CCM?

Start using the Cloud Controls Matrix to simplify compliance with multiple standards & regulations.