Streamlining Cloud Security: Integrating CSA CCM Controls into Your ISO/IEC 27001 Framework
Blog Published: 10/29/2024
In today’s rapidly evolving security landscape, it can be overwhelming to manage multiple frameworks, especially for organizations striving for excellence in cloud security. The CSA Cloud Controls Matrix (CCM) is a gold standard in cloud security governance, providing a detailed map of best pract...
New Paper from Cloud Security Alliance Examines Considerations and Application of Zero Trust Principles for Critical Infrastructure
Press Release Published: 10/29/2024
Paper bridges gap between traditional information technology security methodologies and the unique demands of critical infrastructure sectorsSEATTLE – Oct. 29, 2024 – In today's interconnected world, critical infrastructure (CI) sectors face an ever-evolving landscape of cyber and physical threat...
Elevating Security Standards with AI Cloud Security Compliance Tools
Blog Published: 10/28/2024
Written by Ashwin Chaudhary, CEO, Accedere.Organizations are quickly moving to cloud environment in today's digital landscape due to it’s potential for cost savings, scalability, and flexibility. But this change also brings a complicated new set of compliance and security issues. Here are AI clou...
Democracy at Risk: How AI is Used to Manipulate Election Campaigns
Blog Published: 10/28/2024
From spreading disinformation to facilitating voter manipulation, AI can be used for unethical election practicesOriginally published by Enkrypt AI.Written by Satbir Singh, Product Manager and Engineer, Enkrypt AI.It's election season in the United States once again. As political candidates ramp ...
Are Companies Becoming More Transparent About Cyber Incidents?
Blog Published: 10/28/2024
Originally published by CXO REvolutionaries.Written by Nat Smith, Sr. Director, Product Management, Zscaler.Not long ago, companies were hesitant to disclose cyber incidents, fearing a backlash and damage to their reputations, and a loss of customer trust. In 2017, Equifax waited six weeks to dis...
How CSA Research Uses the Cloud Controls Matrix to Address Diverse Security Challenges
Blog Published: 10/25/2024
CSA extensively leverages the Cloud Controls Matrix (CCM) to enhance security practices across various domains of cloud research. The CCM is a comprehensive cloud security framework consisting of 197 security control objectives. The main purpose of the framework is to help organizations address t...
Unpacking the Cloud Security Best Practices from CISA and the NSA
Blog Published: 10/25/2024
Originally published by Tenable. Written by Zan Liffick. Recent cloud security guidance from CISA and the NSA offers a wealth of recommendations to help organizations reduce risk. This blog highlights key takeaways, provides further insights from CIS, and explores how utilizing cloud securi...
Elevating Alert Readiness: A People-First Approach for CISOs
Blog Published: 10/25/2024
Originally published by Devoteam.The Gartner Security & Risk Management Summit 2024 hammered home the need for a proactive and resilient approach to cybersecurity. Sure, there were plenty of shiny new technologies and strategies on display, but the biggest takeaway for me was the resounding e...
The CSA Triangle Chapter’s Year of Growth and Collaboration: 2023-2024 Highlights
Blog Published: 10/24/2024
Over the past year, under the leadership of Co-founder & President Shankar Chebrolu, the CSA Triangle Chapter has played a pivotal role in advancing cloud security education, building partnerships with local chapters and leading academic institutions, and fostering community engagement. The t...
Shadow AI Prevention: Safeguarding Your Organization’s AI Landscape
Blog Published: 10/24/2024
Written by CSA's AI Organizational Responsibility Working Group.In today’s rapidly evolving technological landscape, the rise of Shadow AI poses a significant challenge to organizations. Shadow AI refers to unauthorized or undocumented AI systems within an organization, which can compromise secur...
How to Simulate Session Hijacking in Your SaaS Applications
Blog Published: 10/24/2024
Originally published by AppOmni.Written by Justin Blackburn, Sr. Cloud Threat Detection Engineer, AppOmni.In our recent post on session hijacking, we examined how sessions work and discussed how sessions can be compromised. We also outlined mitigations that practitioners implement to thwart sessi...
The Cybersecurity Landscape in the Benelux Region and Beyond
Blog Published: 10/23/2024
Written by Matthew Robertson, Benelux Cyber Summit Program Manager.In today’s rapidly evolving digital landscape, staying informed is critical. In order to help you stay ahead of the growing cyber threat landscape, we are excited to introduce the Benelux Cyber Summit 2024 Annual Report—an in-dept...
Six Key Use Cases for Continuous Controls Monitoring
Blog Published: 10/23/2024
Originally published by RegScale.Written by Esty Peskowitz.Maintaining a strong security posture and ensuring compliance are critical challenges for organizations. Are you looking for ways to address these challenges more effectively? Continuous Controls Monitoring (CCM) offers an effective solut...
7 Ways Data Access Governance Increases Data ROI
Blog Published: 10/23/2024
Originally published by Normalyze.Written by Vamsi Koduru.Data is the backbone of your organization’s success—fueling informed decision-making, streamlining operations, enhancing customer experiences, and driving innovation. But without proper governance, you may not achieve these benefits. That’...
The Current Landscape of Global AI Regulations
Blog Published: 10/22/2024
Originally published by Truyo.As artificial intelligence (AI) continues to permeate various aspects of our lives, understanding the regulatory frameworks governing its development and application is becoming increasingly important. From the United States to China, different countries are adopting...
Cloud Security Alliance Releases Second Paper Delineating Organizational Responsibilities for Successfully and Ethically Implementing Artificial Intelligence
Press Release Published: 10/22/2024
Paper provides comprehensive, industry-neutral guidelines and best practices for various stakeholders, from CISOs and AI developers to business leaders and policymakersSEATTLE – Oct. 22, 2024 – Driven by the need to address the evolving landscape of Artificial Intelligence (AI) and its associated...
Optimizing Secrets Management to Enhance Security and Reduce Costs
Blog Published: 10/22/2024
Written by Itzik Alvas, Entro Security.Cyber threats are evolving rapidly. Organizations must navigate the delicate balance between robust security measures and cost-efficiency. One critical aspect of this balancing act is Non-Human identities & secrets management; secrets management is how o...
Top Threat #4 - Cloudy with a Chance of Breach: The Cloud Security Strategy Storm
Blog Published: 10/21/2024
Written by CSA’s Top Threats Working Group.In this blog series, we cover the key security challenges from CSA's Top Threats to Cloud Computing 2024. Drawing from the insights of over 500 experts, we'll discuss the 11 top cybersecurity threats, their business impact, and how to tackle them. Whethe...
5 Behaviors for Transforming Your Cybersecurity Leadership
Blog Published: 10/21/2024
Originally published by CXO REvolutionaries.Written by Ben Corll, CISO in Residence, Zscaler.As an enterprise cybersecurity leader, your role is pivotal in safeguarding your organization's assets, data, people, and reputation. You likely have a very capable team to help with each of these tasks, ...
File-Sharing Fraud: Data Reveals 350% Increase in Hard-to-Detect Phishing Trend
Blog Published: 10/21/2024
Originally published by Abnormal Security.Phishing has long remained a favorite strategy among cybercriminals, and as security awareness has evolved, so have their tactics. According to our H2 2024 Email Threat Report, which was released today, phishing makes up nearly 72% of all advanced attacks...