CSA Blog

  • Originally published by Avanade. Written by Martijn Zantinge. According to research, the number of identity & access management (IAM) projects that don't achieve their initial goals is alarmingly high. I know very few other solution areas within IT that have such a poor track record...
  • Trust and Regulation were the greatest influencing factors, report foundSEATTLE – June 6, 2023 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications and best practices to help ensure a secure cloud computing environment...
  • Originally published by BigID. Written by Peggy Tsai. AI Governance has long been important for organizations, providing a framework to prioritize investments in artificial intelligence. It ensures transparency, auditability, security, and compliance in data management. But now,...
  • Originally published by Dazz. Written by Amit Ripshtos, Tech Lead, Dazz. According to Gartner, 99% of cloud security breaches in the next three years will be caused by preventable misconfigurations and coding mistakes. That’s why your company probably has, over the past few years...
  • Originally published by MSECB. 1. What is the CSA STAR Certification?The CSA STAR (Security, Trust, and Assurance Registry) Certification is a program launched by the Cloud Security Alliance (CSA) in 2011 that provides independent third-party assessment and certification of the...
  • More than half of security executives experienced a SaaS security incident in the past two yearsGartner Security and Risk Management Summit, National Harbor, Maryland – June 5, 2023 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards...
  • Is Your Data Leaking via ChatGPT?

    Originally written and published by Code42. In November 2022, OpenAI released ChatGPT, a generative artificial intelligence (GAI) tool, which has since taken the world by storm. Only two months after its launch, it had over 100 million users, making it “the fastest-growing consumer...
  • Originally published by DigiCert. Written by Timothy Hollebeek. Over the last few months, we’ve seen an increase in the use of AI and machine learning with the widespread adoption of ChatGPT and other AI tools. The concept of these tools is exciting and can help save time, simplify...
  • Originally published by TrueFort.How can network security engineers and application developers work towards best practices? As two crucial roles in any organization, network security and application development teams must rely on each other to ensure the safe and efficient operation...
  • Originally published by CXO REvolutionaries. Written by Tamer Baker, Field CTO - Healthcare, Government, & Education, Zscaler. Healthcare organizations need rigorous security – but don’t always get it In healthcare, medical devices required for patient care, like dialysis machines...
  • Anatomy of a Modern Attack Surface

    Originally published by Microsoft Security. Six areas for organizations to manage As the world becomes more connected and digital, cybersecurity is becoming more complex. Organizations are moving more infrastructure, data, and apps to the cloud, supporting remote work, and engaging...
  • Originally published by NCC Group. Written by Sourya Biswas, Technical Director, NCC Group. One of the problems that cyber security stakeholders face is the overabundance of tools and processes. Just Google “firewall providers” and you are deluged with information; replace firewall...
  • Originally published by Strata.Written by Steve Lay.With increased cloud migration and the adoption of cloud-based apps, Cloud Security Architects and IT Decision-Makers are in a race to achieve interoperability between diverse identity systems. This creates a monumental challenge...
  • Originally published by Abnormal Security. Written by Arun Singh. Over the past several months, organizations have felt the strain of tumultuous economic conditions. Budget reductions ranging in severity from technology spending cutbacks to throngs of employee layoffs have sent waves...
  • Originally published by Coalfire. Written by Mark Carney, Executive Vice President, Coalfire. Continuous adaptation of defensive strategies is needed to mitigate, detect, and respond to modern threats. Ensuring that investments achieve the required level of agility should be a primary...