CSA Blog

  • Originally published by Reco.Written by Gal Nakash.On March 14, Microsoft made Copilot available to customers in their 365 environment. Originally designed to enable productivity, Copilot is an AI chatbot that allows any user to conduct research or create content. It has the ability...
  • Written by Uday Srinivasan, CTO, Acante.We previously discussed how the modern data stack has changed the threat landscape today. In part II, below, we outline exactly how security and data teams can enable modern data teams to innovate rapidly without compromising on the security...
  • Event to provide attendees with a holistic understanding of AI’s future along with pragmatic advice on managing risks and gaining benefits from generative AI SEATTLE – April 17, 2024 – This year, the Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining...
  • Originally published by InsiderSecurity.Data Breaches are an ever-present threat to enterprises in today’s connected world. Whether you are a small SME or a large multinational company, the risk of a data breach and the company becoming another headline is a constant concern for...
  • Originally published by Schellman.Amidst the evolving patchwork of data protection and privacy legislation in the United States, privacy remains a top priority for organizations. But protecting privacy also requires resources, and while not all organizations have that much to spare...
  • Originally published by Cyera.Written by Leo Reznik. Microsoft is taking the lead when it comes to AI-powered ecosystems. The company’s newly introduced Copilot AI assistant for Microsoft 365 surfaces organizational data to deliver users a seamless workflow experience. However, with...
  • Originally published by CXO REvolutionaries.Written by Ben Corll, CISO in Residence, Zscaler.(And why it should become our outer superhero persona, too)Let's face it. The days of the CISO as the lone wolf, guarding the castle walls with a stack of firewalls and a suspicious glare...
  • Originally published by Truyo.Written by Dan Clarke.In 2024, a surge of global AI legislation is imminent, with the United States poised to follow the European Union’s lead by implementing comprehensive nationwide rules and guidelines. Senate Commerce Committee Chair Maria Cantwell...
  • Written by MJ Schwenger, CSA AI Working Group.The explosive emergence of Generative AI, with its ability to create seemingly magical outputs from text to code, is undeniably exciting. However, lurking beneath this shiny surface lies a Pandora's box of potential risks that demand...
  • Originally published by Uptycs.When it comes to cybersecurity, Remote Code Execution (RCE) might sound complex, but in essence, it's a straightforward concept with profound implications. Among the myriad of security vulnerabilities, RCEs are particularly alarming due to their high...
  • Originally published by Vanta.As your business grows, there are new demands of the security team, like adding additional compliance frameworks, more security questionnaires, or new, advanced requirements from large enterprise customers.While this growth is exciting, it also comes...
  • Written by Chandra Rajagopalan, Principal Software Engineer, Netskope. A really short reminiscence of network and security protocolsFrom the 1970s to the 2000s, creating new protocols and enhancing the protocols was prevalent among networking and security experts. These protocols...
  • In today's digitally interconnected world, where cybercriminals continue to advance as technology does, understanding the landscape of cyber threats and vulnerabilities is crucial for both individuals and organizations. Below, we define seven fundamental terms and provide additional...
  • Originally published by Sonrai Security.Written by Tally Shea and Deirdre Hennigar.MITRE ATT&CK Framework: PersistenceThis blog is the second publication in a series exploring the most powerful cloud permissions and how they map to the MITRE ATT&CK Framework. If you have not yet...
  • Written by Nicole Krenz, Web Marketing Specialist, CSA.The cloud security landscape is ever-evolving, presenting new opportunities and challenges, especially in the realms of AI, compliance and governance, and continuous security education and advancement. The Cloud Security Alliance...