Blog
Read the latest cloud security news, trends, and thought leadership from subject matter experts.
![](/assets/blog/blog-hero-e63b7e60455a73004d8d2ed76a22b1c22d6842342e1a00e7d9e5ec7f50f3edb0.png)
![](https://cloudsecurityalliance.org/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6MTE2OTMsInB1ciI6ImJsb2JfaWQifX0=--c5f565eee2541b70d0507484f40fedc0ce459f2c/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGciLCJyZXNpemVfdG9fbGltaXQiOls3NjgsNTc2XX0sInB1ciI6InZhcmlhdGlvbiJ9fQ==--3c903a14319ef9458a777f67b75c9f24e816d253/The-Components-of-IAM.jpg)
Core Cloud
The Risk and Impact of Unauthorized Access to Enterprise Environments
Published: 05/17/2024
![](https://cloudsecurityalliance.org/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6NTczMywicHVyIjoiYmxvYl9pZCJ9fQ==--f6eba99c7847187ab0ba62abb2e8d7697fc9325e/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGciLCJyZXNpemVfdG9fbGltaXQiOls3NjgsNTc2XX0sInB1ciI6InZhcmlhdGlvbiJ9fQ==--3c903a14319ef9458a777f67b75c9f24e816d253/Keeping-up-with-log4shell-aka-CVE-2021-44228-aka-the-log4j-version-2.jpg)
Future Cloud
Securing Generative AI with Non-Human Identity Management and Governance
Published: 05/16/2024
![](https://cloudsecurityalliance.org/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6MTE5MTIsInB1ciI6ImJsb2JfaWQifX0=--7b4b9113aac7c16ce85fd2c5981c609988f1c337/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGciLCJyZXNpemVfdG9fbGltaXQiOls3NjgsNTc2XX0sInB1ciI6InZhcmlhdGlvbiJ9fQ==--3c903a14319ef9458a777f67b75c9f24e816d253/Rise-of-Cloud-Computing-Adoption-and-Cybercrimes.jpg)
Core Cloud
The Importance of Securing Your Organization Against Insider and Offboarding Risks
Published: 05/14/2024
![](https://cloudsecurityalliance.org/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6NzQxMiwicHVyIjoiYmxvYl9pZCJ9fQ==--51f56b247ca4ad085cc6f46c85a1fb89434c13e3/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGciLCJyZXNpemVfdG9fbGltaXQiOls3NjgsNTc2XX0sInB1ciI6InZhcmlhdGlvbiJ9fQ==--3c903a14319ef9458a777f67b75c9f24e816d253/Focus-on-People-Process-and-Technology-to-Secure-Your-Shadow-IT.jpg)
Future Cloud
Zero Trust & Identity and Access Management: Mitigating Shadow Access
Published: 05/10/2024
![](https://cloudsecurityalliance.org/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6MTMwMjgsInB1ciI6ImJsb2JfaWQifX0=--ffb6ef3abbf5689ad3594396c88292979141ee7b/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGciLCJyZXNpemVfdG9fbGltaXQiOls3NjgsNTc2XX0sInB1ciI6InZhcmlhdGlvbiJ9fQ==--3c903a14319ef9458a777f67b75c9f24e816d253/7-Best-Practices-for-Cloud-Incident-Response.jpg)
Core Cloud
Automation is Key: DHS Report Unveils Lessons from the Microsoft Exchange Incident
Published: 05/02/2024
![](https://cloudsecurityalliance.org/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6NTIzMywicHVyIjoiYmxvYl9pZCJ9fQ==--a0de0aa083450dc6a637a1abf30052b7bd7999f7/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGciLCJyZXNpemVfdG9fbGltaXQiOls3NjgsNTc2XX0sInB1ciI6InZhcmlhdGlvbiJ9fQ==--3c903a14319ef9458a777f67b75c9f24e816d253/Understanding-Compliance.jpg)
Cloud Assurance
Upselling Cybersecurity: Why Baseline Security Features Shouldn’t Be a Commodity
Published: 04/24/2024
Filter by Theme
Core Cloud![](/assets/blog/core_cloud-0af9e56f31928fe8d35b4354ad4dc22fcfb074aae5528b94641d31d26af56de1.png)
![](/assets/blog/core_cloud-0af9e56f31928fe8d35b4354ad4dc22fcfb074aae5528b94641d31d26af56de1.png)
Core Cloud
Whether you have an established cloud security program or are starting your cloud migration, these blogs will help you enhance your cloud security strategy . Learn about cybersecurity threats, certification, and more.
Cloud Assurance![](/assets/blog/cloud_assurance-0e2ec5c7e9c553677900f4c5c7c963959220b4618f8d4e57147871d61a5ebe65.png)
![](/assets/blog/cloud_assurance-0e2ec5c7e9c553677900f4c5c7c963959220b4618f8d4e57147871d61a5ebe65.png)
Cloud Assurance
Improve the security and compliance posture of your organization and leverage the controls inside of cloud assurance. Gain the guidance and tools to build your own cloud assurance ecosystem.
Future Cloud![](/assets/blog/future_cloud-4aec67fc25f70b98664a1999c96a352426cc0a0b1c74c0c4fff0b1c73c723ae8.png)
![](/assets/blog/future_cloud-4aec67fc25f70b98664a1999c96a352426cc0a0b1c74c0c4fff0b1c73c723ae8.png)
Future Cloud
Leverage CSA to help your organization solve tomorrow's problems today. Explore innovative technologies and strategies through the topics of Zero Trust, Quantum, and more.