Blog
Read the latest cloud security news, trends, and thought leadership from subject matter experts.
![](/assets/blog/blog-hero-e63b7e60455a73004d8d2ed76a22b1c22d6842342e1a00e7d9e5ec7f50f3edb0.png)
![](https://cloudsecurityalliance.org/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6MTE1MTcsInB1ciI6ImJsb2JfaWQifX0=--c1c8d34b268ecda1fdebd9e6e49665d3e80df1a1/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGciLCJyZXNpemVfdG9fbGltaXQiOls3NjgsNTc2XX0sInB1ciI6InZhcmlhdGlvbiJ9fQ==--3c903a14319ef9458a777f67b75c9f24e816d253/Why-You-Need-Application-Security-Testing-for-Business-Critical-Applications-Part-4.jpg)
Core Cloud
Last Mile Enforcement: Securing Those Unmanageable Non-Standards-Based Applications
Published: 07/27/2023
![](https://cloudsecurityalliance.org/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6MTEwNTksInB1ciI6ImJsb2JfaWQifX0=--860bc8253b6edb61ca73ada5b311b8ba867ceaca/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGciLCJyZXNpemVfdG9fbGltaXQiOls3NjgsNTc2XX0sInB1ciI6InZhcmlhdGlvbiJ9fQ==--3c903a14319ef9458a777f67b75c9f24e816d253/Hatchet-&-Scalpel.jpg)
Core Cloud
Four Ways to Quickly Determine Your Atomization Issue and Next Steps to Fix it
Published: 07/27/2023
![](https://cloudsecurityalliance.org/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6NDUxMCwicHVyIjoiYmxvYl9pZCJ9fQ==--f5fdea8f41a994d4c23bd552b54f3090b0f8d44e/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGciLCJyZXNpemVfdG9fbGltaXQiOls3NjgsNTc2XX0sInB1ciI6InZhcmlhdGlvbiJ9fQ==--3c903a14319ef9458a777f67b75c9f24e816d253/How-to-Secure-Cloud-Non-Native-Workloads.jpg)
Core Cloud
Data Security Posture Management (DSPM): Best Practices Guide for CISOs
Published: 07/24/2023
![](https://cloudsecurityalliance.org/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6OTY4NCwicHVyIjoiYmxvYl9pZCJ9fQ==--dcff7f690750e6f42822f5103932df6b1ac6bb3d/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGciLCJyZXNpemVfdG9fbGltaXQiOls3NjgsNTc2XX0sInB1ciI6InZhcmlhdGlvbiJ9fQ==--3c903a14319ef9458a777f67b75c9f24e816d253/How-to-Secure-Deployments-in-Kubernetes.jpg)
Core Cloud
Enhancing Cloud Security: Four Vital Practices for Kubernetes Security
Published: 07/19/2023
![](https://cloudsecurityalliance.org/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6MTIxMDcsInB1ciI6ImJsb2JfaWQifX0=--a6df7d0d0f6c049215b598435d9534e9514837d0/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGciLCJyZXNpemVfdG9fbGltaXQiOls3NjgsNTc2XX0sInB1ciI6InZhcmlhdGlvbiJ9fQ==--3c903a14319ef9458a777f67b75c9f24e816d253/3-Access-Security-Lessons-Learned-from-the-Marriott-Data-Breach.jpg)
Core Cloud
Top Takeaways from the Gartner® Innovation Insight: Data Security Posture Management
Published: 07/19/2023
![](https://cloudsecurityalliance.org/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6MTAwMzYsInB1ciI6ImJsb2JfaWQifX0=--79060db0e93e12e21f713c7eecaec0b598dd3706/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGciLCJyZXNpemVfdG9fbGltaXQiOls3NjgsNTc2XX0sInB1ciI6InZhcmlhdGlvbiJ9fQ==--3c903a14319ef9458a777f67b75c9f24e816d253/Prioritizing-cloud-security-threats-what-you-need-to-know.jpg)
Core Cloud
Uniting Enterprises for a Safer Future: The Collective Influence of the Cloud Security Alliance
Published: 07/13/2023
![](https://cloudsecurityalliance.org/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6Nzg3NywicHVyIjoiYmxvYl9pZCJ9fQ==--43a11fcad582407543e8e0ce4669ae898094f308/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGciLCJyZXNpemVfdG9fbGltaXQiOls3NjgsNTc2XX0sInB1ciI6InZhcmlhdGlvbiJ9fQ==--3c903a14319ef9458a777f67b75c9f24e816d253/The-End-of-Agent-Technology-in-the-Cloud.jpg)
Core Cloud
Agents vs Agentless: Choosing the Right Security Approach for Your Specialized Cloud Virtual Machine Workloads
Published: 07/13/2023
Filter by Theme
Core Cloud![](/assets/blog/core_cloud-0af9e56f31928fe8d35b4354ad4dc22fcfb074aae5528b94641d31d26af56de1.png)
![](/assets/blog/core_cloud-0af9e56f31928fe8d35b4354ad4dc22fcfb074aae5528b94641d31d26af56de1.png)
Core Cloud
Whether you have an established cloud security program or are starting your cloud migration, these blogs will help you enhance your cloud security strategy . Learn about cybersecurity threats, certification, and more.
Cloud Assurance![](/assets/blog/cloud_assurance-0e2ec5c7e9c553677900f4c5c7c963959220b4618f8d4e57147871d61a5ebe65.png)
![](/assets/blog/cloud_assurance-0e2ec5c7e9c553677900f4c5c7c963959220b4618f8d4e57147871d61a5ebe65.png)
Cloud Assurance
Improve the security and compliance posture of your organization and leverage the controls inside of cloud assurance. Gain the guidance and tools to build your own cloud assurance ecosystem.
Future Cloud![](/assets/blog/future_cloud-4aec67fc25f70b98664a1999c96a352426cc0a0b1c74c0c4fff0b1c73c723ae8.png)
![](/assets/blog/future_cloud-4aec67fc25f70b98664a1999c96a352426cc0a0b1c74c0c4fff0b1c73c723ae8.png)
Future Cloud
Leverage CSA to help your organization solve tomorrow's problems today. Explore innovative technologies and strategies through the topics of Zero Trust, Quantum, and more.