CSA Blog

  • Originally published by Abnormal Security.Written by Mike Britton.In the ever-evolving world of cybersecurity, the role of Chief Information Security Officer (CISO) has been firmly established as a critical position. And while the journey to becoming a CISO can be challenging, the...
  • Originally published by CXO REvolutionaries.Written by Ben Corll, CISO in Residence, Zscaler.In early 2024, I had the privilege of teaching a SANS leadership course in New Orleans. The food was amazing, as expected. What I didn't expect was the sheer number of operational technology...
  • Originally published by Reco.Written by Gal Nakash.What is Microsoft Copilot for Security?‍Microsoft Copilot for Security is an innovative component of the Microsoft security product portfolio. It is essentially engineered to redefine the management of security incidents. This solution...
  • Report series charts course for responsible and secure development and deployment of AIRSA Conference (San Francisco) – May 6, 2024 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure...
  • Originally published by Cloud Computing Consultants.Cloud migrations are complex. Rapidly evolving technology, team culture changes, and changing architectural requirements leave companies seeking options to alleviate their cloud migration paths. As a result, businesses are bombarded...
  • CCZT helps security professionals build knowledge to drive the definition, implementation, and management of Zero TrustSAN FRANCISCO (RSA Conference) – May 6, 2024 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications...
  • In the realm of cloud security, understanding key management is paramount to safeguarding sensitive data. Encryption, key generation, and access control help ensure that sensitive information remains unreadable and inaccessible to unauthorized parties. Without a thorough understanding...
  • Originally published by Cyera.Healthcare organizations face rising cybersecurity threats looking to exfiltrate patient data. This article explores major healthcare data breaches, the value of stolen medical info, and how data security posture management (DSPM) solutions provide comprehensive...
  • Originally published by Schellman.Did you recently implement a new artificial intelligence (AI) feature within your application and now your customers are starting to ask for AI-specific penetration tests? Are you curious as to how an assessment like that would work? As with all...
  • Originally published by CXO REvolutionaries.Written by Ben Corll, CISO in Residence, Zscaler.Ransomware – malicious software that encrypts data until a ransom is paid for its return or is leaked without its owner's consent – remains a persistent threat despite ongoing efforts to...
  • DevSecOps Tools

    Originally published by Dazz.Written by Noah Simon, Head of Product Marketing, Dazz.The goal of DevSecOps is to integrate security practices into the DevOps process. While much of the narrative of DevSecOps has been around writing ‘more secure code’, the narrative has expanded recently...
  • Originally published by CrowdStrike.ALPHA SPIDER is the adversary behind the development and operation of the Alphv ransomware as a service (RaaS).Over the last year, ALPHA SPIDER affiliates have been leveraging a variety of novel techniques as part of their ransomware operations...
  • A Practical GuideOriginally published by Sysdig.Written by Nigel Douglas.The Sysdig 2024 Cloud‑Native Security and Usage Report highlights the evolving threat landscape, but more importantly, as the adoption of cloud-native technologies such as container and Kubernetes continue to...
  • Post-Quantum Preparedness

    Written by Ascertia.The world of cryptography is on the cusp of a significant change. Quantum computers, once thought of as mere science fiction, are rapidly becoming a reality. While widespread availability of these powerful machines might not be imminent, their potential to break...
  • Written by the AuditCue Content Team. The COVID-19 pandemic serves as a prime example of external risks faced by companies, causing disruptions in supply chains, declines in demand, and government-mandated closures. However, some companies were able to adapt and innovate in response...