CSA Research Publications
Whitepapers, Reports and Other Resources
Browse Publications
![]() | Zero Trust Privacy Assessment and Guidance When people discuss Zero Trust, they often focus on how it can help protect data across an organization. However, they tend to forget how it can also help... Request to download |
![]() | Understanding Data Security Risk Survey Report 2025 Organizations today face a rapidly changing threat landscape, where the complexities of hybrid and multi-cloud environments expose new vulnerabilities and... Request to download |
![]() | Fully Homomorphic Encryption: A Comprehensive Guide for Cybersecurity Professionals - Japanese Translation This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download |
![]() | Zero Trust Guidance for Small and Medium Size Businesses (SMBs) - Japanese Translation This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download |
![]() | Cloud Security for Startups 2024 - Japanese Translation This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download |
![]() | Cybersecurity and the Data Lifecycle The data lifecycle refers to the comprehensive process that data undergoes, from its creation to its eventual disposal. Understanding and securing each ph... Request to download |
![]() | Top Threats Working Group Charter 2025 The Top Threats Working Group aims to provide up-to-date, industry-informed expert insights on cloud security risks, threats, and vulnerabilities to help ... Request to download |
![]() | Fully Homomorphic Encryption: A Comprehensive Guide for Cybersecurity Professionals As organizations increasingly rely on cloud computing, protecting data during processing has become a critical challenge. Traditional encryption methods p... Request to download |
![]() | AI Organizational Responsibilities: AI Tools and Applications This publication is the third installment in a series that explores organizational responsibilities related to Artificial Intelligence (AI). The first pap... Request to download |
![]() | SaaS AI-Risk for Mid-Market Organizations Survey Report Mid-market organizations are struggling to manage expanding Software as a Service (SaaS) environments. To better understand this challenge, Wing Security ... Request to download |
![]() | DLT Cybersecurity Governance Package Distributed Ledger Technology (DLT) brings traceability and transparency to external business workflows, while also instilling trust and efficiency in an ... Request to download |
![]() | Zero Trust Guidance for Critical Infrastructure - Japanese Translation In most nations, the health of public services relies on secure and resilient Critical Infrastructure. We call these infrastructures "critical" because th... Request to download |
![]() | Context-Based Access Control for Zero Trust Traditional access decision-making is agnostic to both Zero Trust and context. Historically, security teams based access decisions on trust. The common ac... Request to download |
![]() | Zero Trust Guidance for Small and Medium Size Businesses (SMBs) Cybersecurity for small businesses involves unique and heightened challenges. This makes the adoption of a Zero Trust strategy critical for safeguarding t... Request to download |
![]() | AI Risk Management: Thinking Beyond Regulatory Boundaries Korean Translation This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download |
![]() | Cloud Security for Startups 2024 Volunteers from the CSA Israel Chapter produced this publication. The content development falls outside the CSA Research Lifecycle. For any questions and ... Request to download |
![]() | Key Management for Public Cloud Migration More and more organizations are adopting public cloud technologies. This leads to a mass data migration where existing applications that are on-premises o... Request to download |
![]() | Top Threats to Cloud Computing 2024 - Japanese Translation This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download |
![]() | Cyber Resiliency in the Financial Industry 2024 Survey Report Data resiliency and operational security have become increasingly critical as digital transformation accelerates. The financial industry faces distinct ch... Request to download |
![]() | AI Resilience A Revolutionary Benchmarking Model for AI Safety - Korean Translation This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download |