Cloud 101CircleEventsBlog
Master CSA’s Security, Trust, Assurance, and Risk program—download the STAR Prep Kit for essential tools to enhance your assurance!

Press Coverage

CSA in the news

Home
Press Coverage
Article TitleSourceDate
Adaptive Shield Releases SaaS-to-SaaS Capabilities to Minimize Supply Chain RisksAIthorityDecember 26, 2022
Spending on the basics, not just technology is vital for cloud security: ReportIT World CanadaDecember 22, 2022
IBM and 70 Global Banks Co-Create New Cybersecurity, Risk FrameworkAcceleration EconomyDecember 20, 2022
IBM to work with nonprofit on cloud security framework for financial servicesSC MagazineDecember 15, 2022
Three trends that steered enterprise cloud in 2022IT BrewDecember 14, 2022
Wiz debuts PEACH tenant isolation framework for cloud applicationsCSODecember 14, 2022
Cloud Migration 101: Creating an Effective Cloud Data Migration StrategyCommunity NassComDecember 09, 2022
KLAS: Security is a Top Factor in Public Cloud Adoption For HIT VendorsHealthITSecurityDecember 09, 2022
WAF is woefully insufficient in today’s container-based applications: Here’s whySecurityDecember 02, 2022
7 Certifications for Cybersecurity Professionals in 2023CXO TodayDecember 02, 2022
Here are all the mistakes your business is making in cloud securityTech MonitorNovember 25, 2022
Solvo Data Posture Manager protects organizations using public cloud services from data leakage and breaches HelpNet SecurityNovember 22, 2022
Membership Makeover: Lessons in Evolving a Membership Model From the MPA’s Trusted Partner NetworkAssociations NowNovember 21, 2022
How training and continuing education are crucial for healthcare cybersecurity leaders and staffHealthcareITNewsNovember 16, 2022
Many Cloud Attacks End in Financial Loss for Healthcare Sector HealthIT SecurityNovember 15, 2022
5 Multi-cloud Security Challenges You Can AvoidITPro TodayNovember 14, 2022
How to Build a Successful Cloud Security StrategySecurity BoulevardNovember 10, 2022
Manual Vs. SSPM: Streamlining SaaS Security ManagementSecurity BoulevardNovember 10, 2022
Can confidential computing stop the next crypto heist?The RegisterNovember 07, 2022
Cloud data security – challenges and priorities for organizationDaily Host NewsNovember 07, 2022