Blog
Read the latest cloud security news, trends, and thought leadership from subject matter experts.
![](/assets/blog/blog-hero-e63b7e60455a73004d8d2ed76a22b1c22d6842342e1a00e7d9e5ec7f50f3edb0.png)
![](https://cloudsecurityalliance.org/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6MTEzMzksInB1ciI6ImJsb2JfaWQifX0=--a1c23985750cee23098309a7df25637a23d24893/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGciLCJyZXNpemVfdG9fbGltaXQiOls3NjgsNTc2XX0sInB1ciI6InZhcmlhdGlvbiJ9fQ==--3c903a14319ef9458a777f67b75c9f24e816d253/C-SCRM-and-the-C-suite-Securing-executive-buy-in-for-supply-chain-risk-management.jpg)
Cloud Assurance
SEC Clarifies Rules on Disclosure of Cybersecurity Incidents: Here’s What You Need to Know
Published: 06/25/2024
![](https://cloudsecurityalliance.org/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6MTEwNjMsInB1ciI6ImJsb2JfaWQifX0=--6ec34805758b8137c6d9d6f9d5895824b2f63fe5/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGciLCJyZXNpemVfdG9fbGltaXQiOls3NjgsNTc2XX0sInB1ciI6InZhcmlhdGlvbiJ9fQ==--3c903a14319ef9458a777f67b75c9f24e816d253/An-Easy-Misconfiguration-to-Make-Hidden-Dangers-in-the-Cloud-Control-Plane.jpg)
Future Cloud
The Risks of Relying on AI: Lessons from Air Canada’s Chatbot Debacle
Published: 06/05/2024
![](https://cloudsecurityalliance.org/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6MTIwMjYsInB1ciI6ImJsb2JfaWQifX0=--9bbd9f9793b2f6ccf562c9c5b5a0eb2f2a2466d6/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGciLCJyZXNpemVfdG9fbGltaXQiOls3NjgsNTc2XX0sInB1ciI6InZhcmlhdGlvbiJ9fQ==--3c903a14319ef9458a777f67b75c9f24e816d253/FIDO-Leading-the-Zero-Trust-Passwordless-Authentication-Evolution.jpg)
Cloud Assurance
New SEC Rules: Material Incident Reporting Through Cybersecurity Disclosures
Published: 05/13/2024
![](https://cloudsecurityalliance.org/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6MTI2ODUsInB1ciI6ImJsb2JfaWQifX0=--51959c969879b0aaa9f160bfe2ebe42cc60ebd98/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGciLCJyZXNpemVfdG9fbGltaXQiOls3NjgsNTc2XX0sInB1ciI6InZhcmlhdGlvbiJ9fQ==--3c903a14319ef9458a777f67b75c9f24e816d253/Pivoting-from-Infrastructure-Resilience-to%20-True-Data-Resilience.jpg)
Cloud Assurance
Utah S.B. 149: Creating a Safe Space for Developers While Regulating Deceptive AI
Published: 05/09/2024
![](https://cloudsecurityalliance.org/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6NDczNywicHVyIjoiYmxvYl9pZCJ9fQ==--bfa653cfebc2d6490adac5e19d8ec3e6f5c35cdf/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGciLCJyZXNpemVfdG9fbGltaXQiOls3NjgsNTc2XX0sInB1ciI6InZhcmlhdGlvbiJ9fQ==--3c903a14319ef9458a777f67b75c9f24e816d253/7-Simple-but-effective-tactics-to-protect-your-website-against-DDoS-attacks-in-2021.jpg)
Cloud Assurance
CPPA AI Rules Cast Wide Net for Automated Decisionmaking Regulation
Published: 04/26/2024
![](https://cloudsecurityalliance.org/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6OTE5MSwicHVyIjoiYmxvYl9pZCJ9fQ==--44c6ad33f4f381e15620025ec9326437de7ee010/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGciLCJyZXNpemVfdG9fbGltaXQiOls3NjgsNTc2XX0sInB1ciI6InZhcmlhdGlvbiJ9fQ==--3c903a14319ef9458a777f67b75c9f24e816d253/Leverage-zero-trust-to-defend-against-geopolitical-uncertainty.jpg)
Future Cloud
Cantwell Proposes Legislation to Create a Blueprint for AI Innovation and Security
Published: 04/15/2024
![](https://cloudsecurityalliance.org/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6NDMzMCwicHVyIjoiYmxvYl9pZCJ9fQ==--918d73b9c87e6b18c37c27c9d69518d2819d6011/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGciLCJyZXNpemVfdG9fbGltaXQiOls3NjgsNTc2XX0sInB1ciI6InZhcmlhdGlvbiJ9fQ==--3c903a14319ef9458a777f67b75c9f24e816d253/PCI-Compliance-Checklist--Ensure-Compliance.jpg)
Cloud Assurance
Understanding PCI DSS: A Guide to the Payment Card Industry Data Security Standard
Published: 02/26/2024
![](https://cloudsecurityalliance.org/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6NDgzOCwicHVyIjoiYmxvYl9pZCJ9fQ==--72309dfb71e8e0e827339837d391d15cc1b6e541/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGciLCJyZXNpemVfdG9fbGltaXQiOls3NjgsNTc2XX0sInB1ciI6InZhcmlhdGlvbiJ9fQ==--3c903a14319ef9458a777f67b75c9f24e816d253/Will-New-Executive-Order-on-Cybersecurity-Fast-Track-Zero-Trust-.jpg)
Future Cloud
Biden’s “Sweeping” AI Executive Order is Here. Is the Cybersecurity Industry Ready?
Published: 12/08/2023
![](https://cloudsecurityalliance.org/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6ODM2NCwicHVyIjoiYmxvYl9pZCJ9fQ==--3d17802c8e5703a2a7622787e4292443e97a0eae/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGciLCJyZXNpemVfdG9fbGltaXQiOls3NjgsNTc2XX0sInB1ciI6InZhcmlhdGlvbiJ9fQ==--3c903a14319ef9458a777f67b75c9f24e816d253/Build-a-stronger-cybersecurity-team-through-diversity-and-training.jpg)
Core Cloud
Cloud Security Alliance Cybersecurity Trainings Now Available on the GSA Multiple Award Schedule
Published: 07/14/2023
Filter by Theme
Core Cloud![](/assets/blog/core_cloud-0af9e56f31928fe8d35b4354ad4dc22fcfb074aae5528b94641d31d26af56de1.png)
![](/assets/blog/core_cloud-0af9e56f31928fe8d35b4354ad4dc22fcfb074aae5528b94641d31d26af56de1.png)
Core Cloud
Whether you have an established cloud security program or are starting your cloud migration, these blogs will help you enhance your cloud security strategy . Learn about cybersecurity threats, certification, and more.
Cloud Assurance![](/assets/blog/cloud_assurance-0e2ec5c7e9c553677900f4c5c7c963959220b4618f8d4e57147871d61a5ebe65.png)
![](/assets/blog/cloud_assurance-0e2ec5c7e9c553677900f4c5c7c963959220b4618f8d4e57147871d61a5ebe65.png)
Cloud Assurance
Improve the security and compliance posture of your organization and leverage the controls inside of cloud assurance. Gain the guidance and tools to build your own cloud assurance ecosystem.
Future Cloud![](/assets/blog/future_cloud-4aec67fc25f70b98664a1999c96a352426cc0a0b1c74c0c4fff0b1c73c723ae8.png)
![](/assets/blog/future_cloud-4aec67fc25f70b98664a1999c96a352426cc0a0b1c74c0c4fff0b1c73c723ae8.png)
Future Cloud
Leverage CSA to help your organization solve tomorrow's problems today. Explore innovative technologies and strategies through the topics of Zero Trust, Quantum, and more.