ChaptersCircleEventsBlog

Press Coverage

CSA in the news

Home
Press Coverage
Article TitleSourceDate
Expel expands MDR coverage to include Oracle Cloud InfrastructureSDXcentralMarch 12, 2025
Cybersecurity Snapshot: CSA Outlines Data Security Challenges and Best Practices, While ISACA Offers Tips To Retain IT ProsSecurity BoulevardMarch 07, 2025
DeepSeek Debut Drives Increase in Self-Hosted Models, Says Cloud AI ReportVirtualization ReviewMarch 05, 2025
Latest Cloud Security Alliance survey highlights data risk obstacles to organizationsSecurity Info WatchMarch 05, 2025
Key Takeaways from the CSA Understanding Data Security Risk SurveyIT Security NewsMarch 04, 2025
Cloud Security Alliance surveys data risk management in cloudIT Brief AustraliaMarch 04, 2025
Cloud Security Alliance surveys data risk management in cloudChannelLife AustraliaMarch 04, 2025
Cloud Security Alliance surveys data risk management in cloudSecurityBrief AustraliaMarch 04, 2025
Cloud Security Alliance Survey Report Examines How Organizations Assess and Manage Cybersecurity and Data RisksTechnology for YourFebruary 28, 2025
Cloud Security Alliance Survey Report Examines How Organizations Assess and Manage Cybersecurity and Data RisksTMCnet.comFebruary 27, 2025
Cloud Security Alliance Survey Report Examines How Organizations Assess and Manage Cybersecurity and Data RisksVMblog February 27, 2025
Cloud Security Alliance Survey Report Examines How Organizations Assess and Manage Cybersecurity and Data RisksCIO InfluenceFebruary 27, 2025
IMDA launches guidelines for cloud services and data centres ahead of Digital Infrastructure ActThe Business TimesFebruary 25, 2025
How safe are old email accounts? Depends on the settings, experts sayConsumer AffairsFebruary 25, 2025
Eight reasons why your cloud costs are too highCIO SpainFebruary 19, 2025
Secure AI deployment is complicated: 5 ways to get your ducks in a rowSecurity BoulevardFebruary 18, 2025
Cloud Security Alliance Calls for Reassessment of AI Development in the Face of DeepSeek DebutTHE JournalFebruary 18, 2025
Top five tech trends of 2024 and their impact on the 2025 cyberthreat landscapePositive TechnologiesFebruary 12, 2025
Week in review: Exploited 7-Zip 0-day flaw, crypto-stealing malware found on App Store, Google PlayHelpNet SecurityFebruary 09, 2025
Cybersecurity Snapshot: Cyber Agencies Offer Best Practices for Network Edge Security, While OWASP Ranks Top Risks of Non-Human IdentitiesSecurity BoulevardFebruary 07, 2025