Blog
Read the latest cloud security news, trends, and thought leadership from subject matter experts.
![](/assets/blog/blog-hero-e63b7e60455a73004d8d2ed76a22b1c22d6842342e1a00e7d9e5ec7f50f3edb0.png)
![](https://cloudsecurityalliance.org/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6MTE4OTMsInB1ciI6ImJsb2JfaWQifX0=--c8d901a4e3d465e0462ceceeda20849d952204f9/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGciLCJyZXNpemVfdG9fbGltaXQiOls3NjgsNTc2XX0sInB1ciI6InZhcmlhdGlvbiJ9fQ==--3c903a14319ef9458a777f67b75c9f24e816d253/Analyzing-the-Travis-CI-Attack-and-Exposure-of-Developer-Secrets.jpg)
Future Cloud
How a CNAPP Can Take You from Cloud Security Novice to Native in 10 Steps
Published: 06/25/2024
![](https://cloudsecurityalliance.org/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6NDc0MCwicHVyIjoiYmxvYl9pZCJ9fQ==--245a895cf40815e78cb11640a9c5ecb4c15e0319/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGciLCJyZXNpemVfdG9fbGltaXQiOls3NjgsNTc2XX0sInB1ciI6InZhcmlhdGlvbiJ9fQ==--3c903a14319ef9458a777f67b75c9f24e816d253/Real-Time-Security-Metrics-Insights-Every-Risk-Management-Team-Should-Monitor.jpg)
Future Cloud
Risk Management in the Age of Artificial Intelligence: 9 Questions to Ask Your AI-Powered Vendors
Published: 06/11/2024
![](https://cloudsecurityalliance.org/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6OTk0NSwicHVyIjoiYmxvYl9pZCJ9fQ==--07f27e358f582d4b680aa1ea6d0a0034b2576cdf/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGciLCJyZXNpemVfdG9fbGltaXQiOls3NjgsNTc2XX0sInB1ciI6InZhcmlhdGlvbiJ9fQ==--3c903a14319ef9458a777f67b75c9f24e816d253/SSE-The-MVP-of-The-Cybersecurity-Mesh-Architecture.jpg)
Future Cloud
Why a Serverless Architecture Improves the Security of Cloud-Native Applications
Published: 06/03/2024
![](https://cloudsecurityalliance.org/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6MTI1NzgsInB1ciI6ImJsb2JfaWQifX0=--2d1877ac38f5476a75cb328d621d90f826f182f3/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGciLCJyZXNpemVfdG9fbGltaXQiOls3NjgsNTc2XX0sInB1ciI6InZhcmlhdGlvbiJ9fQ==--3c903a14319ef9458a777f67b75c9f24e816d253/Cloud-DNS-Security-How-to-protect-DNS-in-the-Cloud.jpg)
Future Cloud
The Transformative Power of Continuous Threat Exposure Management (Myth or Reality?)
Published: 05/24/2024
![](https://cloudsecurityalliance.org/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6MTI5MjAsInB1ciI6ImJsb2JfaWQifX0=--c6d62abc28d1c477a6115440c13a466b2c786941/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGciLCJyZXNpemVfdG9fbGltaXQiOls3NjgsNTc2XX0sInB1ciI6InZhcmlhdGlvbiJ9fQ==--3c903a14319ef9458a777f67b75c9f24e816d253/Auto-Remediation-in-SaaS-Security-Why-SSPM-Clients-Frequently-Prefer-Guided-Remediation.jpg)
Future Cloud
Automated Cloud Remediation – Empty Hype, Viable Strategy, or Something in Between?
Published: 05/17/2024
![](https://cloudsecurityalliance.org/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6NTM1MywicHVyIjoiYmxvYl9pZCJ9fQ==--153cab8885d6b1b44a87b6b387bce7b0ebe10123/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGciLCJyZXNpemVfdG9fbGltaXQiOls3NjgsNTc2XX0sInB1ciI6InZhcmlhdGlvbiJ9fQ==--3c903a14319ef9458a777f67b75c9f24e816d253/Agents-are-not-enough-why-cloud-security-needs-agentless-deep-scanning.jpg)
Future Cloud
Considerations When Including AI Implementations in Penetration Testing
Published: 04/30/2024
![](https://cloudsecurityalliance.org/assets/fallback/csa-blog-small-66ec0ea90d9db846042543b17f9f5ad3c1dcfa41f4a27f7a34681439f862372d.png)
Future Cloud
AI Hallucinations: The Emerging Market for Insuring Against Generative AI's Costly Blunders
Published: 04/23/2024
![](https://cloudsecurityalliance.org/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6NTYzNSwicHVyIjoiYmxvYl9pZCJ9fQ==--cfc7251bddc3f1ab906e5428b61f9c69fe505109/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGciLCJyZXNpemVfdG9fbGltaXQiOls3NjgsNTc2XX0sInB1ciI6InZhcmlhdGlvbiJ9fQ==--3c903a14319ef9458a777f67b75c9f24e816d253/The-Right-Way-To-Address-Multicloud-Cybersecurity.jpg)
Future Cloud
2024 State of Cloud Security Report Shows That More Risk Prioritization is Needed
Published: 03/18/2024
![](https://cloudsecurityalliance.org/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6MTEzODMsInB1ciI6ImJsb2JfaWQifX0=--88c01e469fd006639b1532ced4670f43a4640704/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGciLCJyZXNpemVfdG9fbGltaXQiOls3NjgsNTc2XX0sInB1ciI6InZhcmlhdGlvbiJ9fQ==--3c903a14319ef9458a777f67b75c9f24e816d253/Should-You-Outsource-or-Manage-Security-In-House.jpg)
Future Cloud
AI & Software Security: How to Implement AI Responsibly and Successfully
Published: 02/21/2024
Filter by Theme
Core Cloud![](/assets/blog/core_cloud-0af9e56f31928fe8d35b4354ad4dc22fcfb074aae5528b94641d31d26af56de1.png)
![](/assets/blog/core_cloud-0af9e56f31928fe8d35b4354ad4dc22fcfb074aae5528b94641d31d26af56de1.png)
Core Cloud
Whether you have an established cloud security program or are starting your cloud migration, these blogs will help you enhance your cloud security strategy . Learn about cybersecurity threats, certification, and more.
Cloud Assurance![](/assets/blog/cloud_assurance-0e2ec5c7e9c553677900f4c5c7c963959220b4618f8d4e57147871d61a5ebe65.png)
![](/assets/blog/cloud_assurance-0e2ec5c7e9c553677900f4c5c7c963959220b4618f8d4e57147871d61a5ebe65.png)
Cloud Assurance
Improve the security and compliance posture of your organization and leverage the controls inside of cloud assurance. Gain the guidance and tools to build your own cloud assurance ecosystem.
Future Cloud![](/assets/blog/future_cloud-4aec67fc25f70b98664a1999c96a352426cc0a0b1c74c0c4fff0b1c73c723ae8.png)
![](/assets/blog/future_cloud-4aec67fc25f70b98664a1999c96a352426cc0a0b1c74c0c4fff0b1c73c723ae8.png)
Future Cloud
Leverage CSA to help your organization solve tomorrow's problems today. Explore innovative technologies and strategies through the topics of Zero Trust, Quantum, and more.