ChaptersEventsBlog
Get 50% Off TAISE for Yourself and We'll Donate a Second Course to a Future AI Leader
Research Publications currently filtered by Topic, Locale.
×

CSA Research Publications

Whitepapers, Reports and Other Resources

Home
Publications

Browse Publications

Sensitive Data in the Cloud

Sensitive Data in the Cloud

Release Date: 07/12/2022

Anjuna commissioned CSA to develop a survey to better understand the industry’s knowledge, attitudes, and opinions regarding sensitive data in the cloud. ...

Request to download
State of ICS Security in the Age of Cloud

State of ICS Security in the Age of Cloud

Release Date: 07/05/2022

The goal of this document hopes to create awareness and share insights on the benefits of leveraging Cloud Computing for ICS/OT. It also attempts to stimu...

Request to download
Top Threats to Cloud Computing Pandemic Eleven

Top Threats to Cloud Computing Pandemic Eleven

Release Date: 06/06/2022

The Top Threats reports have traditionally aimed to raise awareness of threats, risks, and vulnerabilities in the cloud. Such issues are often the result ...

Request to download
Top Threats to Cloud Computing: Egregious Eleven Deep Dive - Arabic Translation

Top Threats to Cloud Computing: Egregious Eleven Deep Dive - Arabic Translation

Release Date: 05/27/2022

This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate...

Request to download
Best Practices for Smart Contract Security Hyperledger Fabric

Best Practices for Smart Contract Security Hyperledger Fabric

Release Date: 05/18/2022

The goal is to establish best practices for using smart contract specifically in Hyperledger Fabric 2.0 environment. This document serves as a guide for S...

Request to download
HPC Cloud Services Onboarding Guide

HPC Cloud Services Onboarding Guide

Release Date: 05/16/2022

This paper aims to present an overview of what to consider to ensure the proper selection, design, and implementation of an HPC solution that will satisfy...

Request to download
Cloud Key Management Working Group Charter

Cloud Key Management Working Group Charter

Release Date: 05/04/2022

Cloud services are becoming ubiquitous in all sizes, and customers encounter many obligations and opportunities for using key management systems with thos...

Request to download
IoT Controls Matrix v3

IoT Controls Matrix v3

Release Date: 04/25/2022

The IoT Security Controls Matrix is relevant for enterprise IoT systems that incorporate multiple types of connected devices, cloud services, and networki...

Request to download
Guide to the IoT Controls Matrix v3

Guide to the IoT Controls Matrix v3

Release Date: 04/25/2022

The Guide to the IoT Security Controls Matrix provides instructions for using the companion CSA IoT Security Controls Matrix v3. This guide explains how t...

Request to download
SaaS Security and Misconfigurations Report

SaaS Security and Misconfigurations Report

Release Date: 04/11/2022

Many recent breaches and data leaks have been tied back to misconfigurations causing it to be a top concern for many organizations. Most research related ...

Request to download
Artificial Intelligence in Healthcare

Artificial Intelligence in Healthcare

Release Date: 01/06/2022

Artificial intelligence (AI) now has the potential to be integrated into all aspects of healthcare, from management to delivery and diagnosis. These advan...

Request to download
Corda Enterprise 4.8 - Architecture Security Report

Corda Enterprise 4.8 - Architecture Security Report

Release Date: 12/15/2021

Blockchain technology is being rapidly adopted by enterprises to bring traceability and transparency to external business workflows. Considering that many...

Request to download
Cloud Key Management System with External Origin Key

Cloud Key Management System with External Origin Key

Release Date: 12/02/2021

The purpose of this document is to provide general guidance for choosing, planning, and deploying cloud-native key management systems (KMS) where there is...

Request to download
Roles and Responsibilities of Third Party Security Services

Roles and Responsibilities of Third Party Security Services

Release Date: 11/30/2021

As we witness the broader adoption of cloud services, it is no surprise that third-party outsourced services are also on the rise. The security responsibi...

Request to download
Information Technology Governance, Risk and Compliance in Healthcare

Information Technology Governance, Risk and Compliance in Healthcare

Release Date: 10/15/2021

Information Technology (IT) Governance, Risk, and Compliance (GRC), are three words that have a significant impact on organizations. While each term seems...

Request to download
Top 10 Blockchain Attacks, Vulnerabilities & Weaknesses

Top 10 Blockchain Attacks, Vulnerabilities & Weaknesses

Release Date: 09/27/2021

Cryptocurrencies and other blockchain virtual assets have been the target of the majority of Distributed Ledger Technology (DLT) attacks and a variety of ...

Request to download
Ransomware in the Healthcare Cloud

Ransomware in the Healthcare Cloud

Release Date: 09/15/2021

Ransomware is the fastest-growing malware threat today. Over the last few years, it has risen to epidemic proportions, quickly becoming a significant reve...

Request to download
Microservices Architecture Pattern

Microservices Architecture Pattern

Release Date: 08/31/2021

This document provides a repeatable approach to architecting, developing, and deploying microservices as Microservices Architecture Patterns (MAPs). The p...

Request to download
Protecting the Privacy of Healthcare Data in the Cloud

Protecting the Privacy of Healthcare Data in the Cloud

Release Date: 08/10/2021

The Health Delivery Organization (HDO) needs to understand the relationship between privacy and security, particularly the differences. This understanding...

Request to download
Cloud Threat Modeling

Cloud Threat Modeling

Release Date: 07/29/2021

The purpose of this document is to enable, encourage cloud and security practitioners to apply threat modeling for cloud applications, services, and security...

Request to download