Blog
Read the latest cloud security news, trends, and thought leadership from subject matter experts.
![](/assets/blog/blog-hero-e63b7e60455a73004d8d2ed76a22b1c22d6842342e1a00e7d9e5ec7f50f3edb0.png)
![](https://cloudsecurityalliance.org/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6MTEyNDcsInB1ciI6ImJsb2JfaWQifX0=--a2c009151ecdea6b6f1761b40d3ee2ed43cd174c/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGciLCJyZXNpemVfdG9fbGltaXQiOls3NjgsNTc2XX0sInB1ciI6InZhcmlhdGlvbiJ9fQ==--3c903a14319ef9458a777f67b75c9f24e816d253/Threat-Activity-Cluster--5--Pistachio.jpg)
Core Cloud
2024 SaaS Security Predictions: A Look at the SaaS Threat Landscape in the Year Ahead
Published: 12/22/2023
![](https://cloudsecurityalliance.org/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6MTA2NjUsInB1ciI6ImJsb2JfaWQifX0=--2e4a2bb4cfd96142eb921e0e6a1705df1928e275/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGciLCJyZXNpemVfdG9fbGltaXQiOls3NjgsNTc2XX0sInB1ciI6InZhcmlhdGlvbiJ9fQ==--3c903a14319ef9458a777f67b75c9f24e816d253/Threat-Activity-Cluster-3-Strawberry.jpg)
Core Cloud
When a Breach Isn't All Bad: Making the Most of Adverse Cyber Circumstances
Published: 12/19/2023
![](https://cloudsecurityalliance.org/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6MTI1NzYsInB1ciI6ImJsb2JfaWQifX0=--87373ec8c17f3e99002628b3b139c719be10b6f9/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGciLCJyZXNpemVfdG9fbGltaXQiOls3NjgsNTc2XX0sInB1ciI6InZhcmlhdGlvbiJ9fQ==--3c903a14319ef9458a777f67b75c9f24e816d253/The-Anatomy-of-Wiper-Malware-Part-2-Third-Party-Drivers.jpg)
Core Cloud
IMPERIAL KITTEN Deploys Novel Malware Families in Middle East-Focused Operations
Published: 12/14/2023
![](https://cloudsecurityalliance.org/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6NTEyMiwicHVyIjoiYmxvYl9pZCJ9fQ==--b6bef1da88ce4e8257363238ac4914b02ed60d85/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGciLCJyZXNpemVfdG9fbGltaXQiOls3NjgsNTc2XX0sInB1ciI6InZhcmlhdGlvbiJ9fQ==--3c903a14319ef9458a777f67b75c9f24e816d253/Coping-with-the-ransomware-threat.jpg)
Core Cloud
LABRAT: Stealthy Cryptojacking and Proxyjacking Campaign Targeting GitLab
Published: 12/04/2023
![](https://cloudsecurityalliance.org/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6ODIzMCwicHVyIjoiYmxvYl9pZCJ9fQ==--9cdf23d1ad76713005de119eabc98f96cbd1eaa4/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGciLCJyZXNpemVfdG9fbGltaXQiOls3NjgsNTc2XX0sInB1ciI6InZhcmlhdGlvbiJ9fQ==--3c903a14319ef9458a777f67b75c9f24e816d253/Key-Differences-Between-Legacy-vs-Cloud-First-DLP.jpg)
Core Cloud
The Windows Restart Manager: How It Works and How It Can Be Hijacked, Part 2
Published: 11/14/2023
![](https://cloudsecurityalliance.org/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6MTA3NzgsInB1ciI6ImJsb2JfaWQifX0=--05761f82eb8b5f5df09b8cb7653092ceb2c69575/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGciLCJyZXNpemVfdG9fbGltaXQiOls3NjgsNTc2XX0sInB1ciI6InZhcmlhdGlvbiJ9fQ==--3c903a14319ef9458a777f67b75c9f24e816d253/Supply-Chain-Attack-CTX-Account-Takeover-and-PHPass-Hijack-Explained.jpg)
Core Cloud
The Windows Restart Manager: How It Works and How It Can Be Hijacked, Part 1
Published: 11/07/2023
![](https://cloudsecurityalliance.org/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6MTE3NDYsInB1ciI6ImJsb2JfaWQifX0=--514e551f980fb783c3a9ad963653cd3f5b78b62e/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGciLCJyZXNpemVfdG9fbGltaXQiOls3NjgsNTc2XX0sInB1ciI6InZhcmlhdGlvbiJ9fQ==--3c903a14319ef9458a777f67b75c9f24e816d253/Cyber-resilience-lessons-from-Ukraine.jpg)
Core Cloud
Shift Left is Only Part of Secure Software Delivery in Financial Services
Published: 11/01/2023
![](https://cloudsecurityalliance.org/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6OTAwMCwicHVyIjoiYmxvYl9pZCJ9fQ==--077ee4f9de928d00fc3e20b05ef67ed0ac475249/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGciLCJyZXNpemVfdG9fbGltaXQiOls3NjgsNTc2XX0sInB1ciI6InZhcmlhdGlvbiJ9fQ==--3c903a14319ef9458a777f67b75c9f24e816d253/When-Ransomware-and-Your-Data-Move-to-the-Cloud-How-to-Strengthen-Protection.jpg)
Core Cloud
Unnatural Selection: Why Cybercriminals are Turning to Encryption-less Ransomware
Published: 10/31/2023
![](https://cloudsecurityalliance.org/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6MzQxMCwicHVyIjoiYmxvYl9pZCJ9fQ==--f6c256ac737d14df2cd34358576b8fa3faad6715/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGciLCJyZXNpemVfdG9fbGltaXQiOls3NjgsNTc2XX0sInB1ciI6InZhcmlhdGlvbiJ9fQ==--3c903a14319ef9458a777f67b75c9f24e816d253/chess-player-%20jeshoots-com-fzOITuS1DIQ-unsplash.jpg)
Core Cloud
Celebrate 20 Years of Cybersecurity Awareness Month and Let’s Secure Our World Together
Published: 10/20/2023
Filter by Theme
Core Cloud![](/assets/blog/core_cloud-0af9e56f31928fe8d35b4354ad4dc22fcfb074aae5528b94641d31d26af56de1.png)
![](/assets/blog/core_cloud-0af9e56f31928fe8d35b4354ad4dc22fcfb074aae5528b94641d31d26af56de1.png)
Core Cloud
Whether you have an established cloud security program or are starting your cloud migration, these blogs will help you enhance your cloud security strategy . Learn about cybersecurity threats, certification, and more.
Cloud Assurance![](/assets/blog/cloud_assurance-0e2ec5c7e9c553677900f4c5c7c963959220b4618f8d4e57147871d61a5ebe65.png)
![](/assets/blog/cloud_assurance-0e2ec5c7e9c553677900f4c5c7c963959220b4618f8d4e57147871d61a5ebe65.png)
Cloud Assurance
Improve the security and compliance posture of your organization and leverage the controls inside of cloud assurance. Gain the guidance and tools to build your own cloud assurance ecosystem.
Future Cloud![](/assets/blog/future_cloud-4aec67fc25f70b98664a1999c96a352426cc0a0b1c74c0c4fff0b1c73c723ae8.png)
![](/assets/blog/future_cloud-4aec67fc25f70b98664a1999c96a352426cc0a0b1c74c0c4fff0b1c73c723ae8.png)
Future Cloud
Leverage CSA to help your organization solve tomorrow's problems today. Explore innovative technologies and strategies through the topics of Zero Trust, Quantum, and more.