Blog
Read the latest cloud security news, trends, and thought leadership from subject matter experts.
![](/assets/blog/blog-hero-e63b7e60455a73004d8d2ed76a22b1c22d6842342e1a00e7d9e5ec7f50f3edb0.png)
![](https://cloudsecurityalliance.org/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6NTY3NiwicHVyIjoiYmxvYl9pZCJ9fQ==--d02536d40b98e0081f8900e6ea945ad5a0938ca5/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGciLCJyZXNpemVfdG9fbGltaXQiOls3NjgsNTc2XX0sInB1ciI6InZhcmlhdGlvbiJ9fQ==--3c903a14319ef9458a777f67b75c9f24e816d253/Best-Practices-for-Standardizing-Identity-Security-at-Scale.jpg)
Cloud Assurance
Ready, Set, Respond: Ensuring Compliance with the SEC Reporting Regulations
Published: 09/21/2023
![](https://cloudsecurityalliance.org/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6NTMzOSwicHVyIjoiYmxvYl9pZCJ9fQ==--229c3d5f62a7737b8c1dfc417249ab5d6d7956ae/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJwbmciLCJyZXNpemVfdG9fbGltaXQiOls3NjgsNTc2XX0sInB1ciI6InZhcmlhdGlvbiJ9fQ==--73071e35a46562ab540859a1ef3adc0e9470c62a/CCM-v4.0-Implementation-Guidelines-Blog.png)
Cloud Assurance
Strengthening Cloud Security: Mapping the Cloud Controls Matrix (CCM) 4.0 to PCI DSS 4.0
Published: 09/19/2023
![](https://cloudsecurityalliance.org/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6MTA5ODQsInB1ciI6ImJsb2JfaWQifX0=--35a5e7f33bb26d36fe47fb236d7f7d5658c5d4d5/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGciLCJyZXNpemVfdG9fbGltaXQiOls3NjgsNTc2XX0sInB1ciI6InZhcmlhdGlvbiJ9fQ==--3c903a14319ef9458a777f67b75c9f24e816d253/Phishing-is-on-the-rise-What-CISOs-should-know.jpg)
Cloud Assurance
Ensuring Cloud Compliance Excellence with ISO Standards and CSA STAR
Published: 09/14/2023
![](https://cloudsecurityalliance.org/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6MTAwOTAsInB1ciI6ImJsb2JfaWQifX0=--71cf3db8d60f9daeb78a1eadf53d09c39ba8e75a/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGciLCJyZXNpemVfdG9fbGltaXQiOls3NjgsNTc2XX0sInB1ciI6InZhcmlhdGlvbiJ9fQ==--3c903a14319ef9458a777f67b75c9f24e816d253/CISO-to-CISO-3-practical-tips-to-protect-your-data-in-the-cloud.jpg)
Cloud Assurance
How Great CISOs Make SaaS Security a Priority for Business Leaders
Published: 09/13/2023
![](https://cloudsecurityalliance.org/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6NTM4MCwicHVyIjoiYmxvYl9pZCJ9fQ==--dea769485a533d17531e48eb755cac61c902d5d7/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGciLCJyZXNpemVfdG9fbGltaXQiOls3NjgsNTc2XX0sInB1ciI6InZhcmlhdGlvbiJ9fQ==--3c903a14319ef9458a777f67b75c9f24e816d253/What-is-a-Cloud-Native-Application-Protection-Platform.jpg)
Future Cloud
5 Reasons Why Just-in-Time Cloud Access is Pioneering the Future of CIEM
Published: 09/13/2023
![](https://cloudsecurityalliance.org/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6MTIyMjUsInB1ciI6ImJsb2JfaWQifX0=--503e6c06c7e5ca0536502b17927d07c1abc70040/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGciLCJyZXNpemVfdG9fbGltaXQiOls3NjgsNTc2XX0sInB1ciI6InZhcmlhdGlvbiJ9fQ==--3c903a14319ef9458a777f67b75c9f24e816d253/Your-Cloud-Footprint-is-Growing-Here%E2%80%99s-How-to-Scale-Cloud-Governance.jpg)
Future Cloud
Discover How to Navigate Compliance Challenges at the Intersection of Data Governance and AI Integration
Published: 09/06/2023
![](https://cloudsecurityalliance.org/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6MTAxMDcsInB1ciI6ImJsb2JfaWQifX0=--1f45a06d69bc9135cd1e5ce3d5a2be987e3208db/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGciLCJyZXNpemVfdG9fbGltaXQiOls3NjgsNTc2XX0sInB1ciI6InZhcmlhdGlvbiJ9fQ==--3c903a14319ef9458a777f67b75c9f24e816d253/Understanding-the-Updates-to-Risk-Management-in-PCI-DSS-v4_0.jpg)
Cloud Assurance
Common Mistakes Businesses Make When it Comes to PCI Compliance and Guidance on How to Avoid Them
Published: 08/28/2023
Filter by Theme
Core Cloud![](/assets/blog/core_cloud-0af9e56f31928fe8d35b4354ad4dc22fcfb074aae5528b94641d31d26af56de1.png)
![](/assets/blog/core_cloud-0af9e56f31928fe8d35b4354ad4dc22fcfb074aae5528b94641d31d26af56de1.png)
Core Cloud
Whether you have an established cloud security program or are starting your cloud migration, these blogs will help you enhance your cloud security strategy . Learn about cybersecurity threats, certification, and more.
Cloud Assurance![](/assets/blog/cloud_assurance-0e2ec5c7e9c553677900f4c5c7c963959220b4618f8d4e57147871d61a5ebe65.png)
![](/assets/blog/cloud_assurance-0e2ec5c7e9c553677900f4c5c7c963959220b4618f8d4e57147871d61a5ebe65.png)
Cloud Assurance
Improve the security and compliance posture of your organization and leverage the controls inside of cloud assurance. Gain the guidance and tools to build your own cloud assurance ecosystem.
Future Cloud![](/assets/blog/future_cloud-4aec67fc25f70b98664a1999c96a352426cc0a0b1c74c0c4fff0b1c73c723ae8.png)
![](/assets/blog/future_cloud-4aec67fc25f70b98664a1999c96a352426cc0a0b1c74c0c4fff0b1c73c723ae8.png)
Future Cloud
Leverage CSA to help your organization solve tomorrow's problems today. Explore innovative technologies and strategies through the topics of Zero Trust, Quantum, and more.