Cloud 101CircleEventsBlog
Participate in the CSA Top Threats to Cloud Computing 2025 peer review to help shape industry insights!
Research Publications currently filtered by Term.
×

CSA Research Publications

Whitepapers, Reports and Other Resources

Home
Publications

Browse Publications

Shadow Access and AI

Shadow Access and AI
Release Date: 03/11/2025

Shadow Access is undesired or unauthorized access to resources, such as applications, networks, and data. Shadow Access is increasingly a cloud issue, res...

Request to download
Zero Trust Guidance for Small and Medium Size Businesses (SMBs) - Japanese Translation

Zero Trust Guidance for Small and Medium Size Businesses (SMBs) - Japanese Translation
Release Date: 02/11/2025

This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate...

Request to download
AI Organizational Responsibilities: AI Tools and Applications

AI Organizational Responsibilities: AI Tools and Applications
Release Date: 01/28/2025

This publication is the third installment in a series that explores organizational responsibilities related to Artificial Intelligence (AI). The first pap...

Request to download
SaaS AI-Risk for Mid-Market Organizations Survey Report

SaaS AI-Risk for Mid-Market Organizations Survey Report
Release Date: 01/27/2025

Mid-market organizations are struggling to manage expanding Software as a Service (SaaS) environments. To better understand this challenge, Wing Security ...

Request to download
Zero Trust Guidance for Small and Medium Size Businesses (SMBs)

Zero Trust Guidance for Small and Medium Size Businesses (SMBs)
Release Date: 01/13/2025

Cybersecurity for small businesses involves unique and heightened challenges. This makes the adoption of a Zero Trust strategy critical for safeguarding t...

Request to download
Map the Transaction Flows for Zero Trust

Map the Transaction Flows for Zero Trust
Release Date: 11/18/2024

The NSTAC Report to the President on Zero Trust defines five steps to implementing a Zero Trust security strategy. This publication provides guidance on e...

Request to download
AI Risk Management: Thinking Beyond Regulatory Boundaries

AI Risk Management: Thinking Beyond Regulatory Boundaries
Release Date: 11/13/2024

While artificial intelligence (AI) offers tremendous benefits, it also introduces significant risks and challenges that remain unaddressed. A comprehensiv...

Request to download
AI Organizational Responsibilities - Governance, Risk Management, Compliance and Cultural Aspects

AI Organizational Responsibilities - Governance, Risk Management, Compliance and Cultural Aspects
Release Date: 10/21/2024

Continuing CSA's efforts to address the evolving AI landscape, this latest publication covers AI governance, risk management, and culture. Understand vari...

Request to download
AI in Medical Research: Applications & Considerations

AI in Medical Research: Applications & Considerations
Release Date: 09/25/2024

The advent of artificial intelligence (AI) has brought about a paradigm shift in numerous fields. AI technologies can process vast amounts of data, recogn...

Request to download
Don’t Panic! Getting Real about AI Governance

Don’t Panic! Getting Real about AI Governance
Release Date: 09/18/2024

The excitement around Generative AI and its potential business value continues to grow. A major factor is AI systems' emerging capability to mimic human-l...

Request to download
Fully Homomorphic Encryption Working Group Charter 2024

Fully Homomorphic Encryption Working Group Charter 2024
Release Date: 08/29/2024

Through the use and deployment of cryptographic libraries, specialist software toolchains, and dedicated hardware and infrastructure, Fully Homomorphic En...

Request to download
Using AI for Offensive Security

Using AI for Offensive Security
Release Date: 08/06/2024

Offensive security involves proactively simulating an attacker’s behavior by using tactics and techniques similar to those of an adversary to identify sys...

Request to download
AI Model Risk Management Framework

AI Model Risk Management Framework
Release Date: 07/23/2024

Sophisticated machine learning (ML) models present exciting opportunities in fields such as predictive maintenance and smart supply chain management. Whil...

Request to download
Defining the Zero Trust Protect Surface

Defining the Zero Trust Protect Surface
Release Date: 03/05/2024

Enterprise adoption and implementation of Zero Trust is broad and growing. Venture Beat reports that 90% of organizations moving to the cloud are adopting...

Request to download
DLT Cybersecurity Maturity Core Framework v1.0

DLT Cybersecurity Maturity Core Framework v1.0
Release Date: 01/22/2024

The “DLT Risk Mitigation Model Tool” is designed to assist organizations in crafting a tailored risk mitigation strategy based on their unique risk appeti...

Request to download
Beyond Passwords: The Role of Passkeys in Modern Web Security

Beyond Passwords: The Role of Passkeys in Modern Web Security
Release Date: 11/12/2023

Web authentication methods have evolved significantly over the years to improve security and the user experience. In the early days of the internet, usern...

Request to download
Cloud Native Application Protection Platform Survey Report

Cloud Native Application Protection Platform Survey Report
Release Date: 08/23/2023

Cloud Native Application Protection Platforms (CNAPPs) have emerged as a critical category of security tooling in recent years due to the complexity of co...

Request to download
How to Design a Secure Serverless Architecture (2023 Version) - Japanese Translation

How to Design a Secure Serverless Architecture (2023 Version) - Japanese Translation
Release Date: 05/12/2023

This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate...

Request to download
An Agile Data Doctrine for a Secure Data Lake

An Agile Data Doctrine for a Secure Data Lake
Release Date: 04/25/2023

Data is now a significant asset in most organizations around the globe, whether government, business, or not-for-profit; the inevitable shift toward its u...

Request to download
Secure Connection Requirements of Hybrid Cloud - Japanese Translation

Secure Connection Requirements of Hybrid Cloud - Japanese Translation
Release Date: 06/14/2022

This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate...

Request to download