Top 5 Latest Cloud Security Hacks and How You Can Avoid Them
March 17, 2020, Roger Grimes, Data-Driven Defense Evangelist Roger Grimes at KnowBe4
Collaborating with CSA
A step-by-step look at the research process, from proposal to publication.
Research Volunteer FAQ
Contributors to research are composed of solution providers, end users, subject matter experts, and key stakeholders in cloud and related technologies. Join the movement!
Thank You Research Contributors!
Research awards recognize individuals who demonstrate significant accomplishments and contribution to CSA research. Annual and long-term achievement awards are bestowed to those who also reflect industry leadership, community participation and passion for volunteerism.
Featured Working Groups
As we move forward into the future of automation, AI is proving to be playing a critical role in the realm of both cyber and cloud security. The ability to learn at a rate that AI does makes it extremely important...
Blockchain and distributed ledger technology is an innovative and continuously evolving technology that has far reaching security implications beyond the financial services industries.
Cloud Controls Matrix
The Cloud Controls Matrix (CCM) working group supports CSA’s industry-leading meta-framework for cloud security assurance. The working group conducts controls mapping projects with the aim of identifying and analysing compliance gaps.
Changing the mindset of the industry and establishing fundamental principles to enhance the development, security, and operations during project lifecycles.
Internet of Things
As the cloud environment expand to new technologies, the connected world depends on devices to manage, orchestrate, and provision data.