CSA’s Cloud Controls Matrix is a gold standard in cloud security. However, if you already adhere to ISO 27001, just focus on ...
CSA’s latest survey report provides a look at the current state of identity architecture and identity governance. Get a ...
Highly convincing AI text, images, and videos have raised concerns about AI’s use in elections - from spreading ...
Cybersecurity disclosures are shifting toward transparency. SEC rules and China's Cybersecurity Law push companies to ...
AI cloud security compliance technologies are cutting-edge fixes made to assist companies in maintaining strong security ...
Recent cloud security guidance from CISA and the NSA offers a wealth of recommendations to help organizations reduce risk. This blog highlights key takeaways, provides further insights from CIS, and ...
Gain expertise in Zero Trust with CSA’s Certificate of Competence in Zero Trust (CCZT). Elevate your security skills and advance your career. Uncover key trends and strategies to conquer multi-cloud ...
Written by Daniele Catteddu, Chief Technology Officer, CSA. A lot is said about “trust” in our industry, but trust is really a means to an end. For an organization, that “end” is the accomplishment of ...
Originally published by Richey May. In today’s cybersecurity landscape, threats are more than just a cautionary tale—they’re a daily reality, and ransomware tops the list of concerns. This aggressive ...
The CSA Security Update podcast is hosted by John DiMaria, Director of Operations Excellence at CSA. The podcast explores the CSA STAR program, cloud security best practices, and associated ...
How do privacy and security overlap? In most aspects of the collection, use or processing of personal data, privacy and security functions overlap or coexist to some ...