CSA Blog

  • Originally published by Abnormal Security.The integration of artificial intelligence (AI) into cybersecurity practices is transforming the landscape, offering both promising advancements and new challenges. The State of AI and Security Survey Report, sponsored by the Cloud Security...
  • Originally published by Pentera.With 73% of organizations tweaking their IT setups every quarter, it’s concerning that only 40% are aligning their security checks accordingly. This frequency gap leaves organizations vulnerable to prolonged risk and highlights a critical area for...
  • Originally published by Dazz.In the ever-evolving landscape of application security, traditional "AppSec in a box" solutions, which bundle static analysis (SAST), software composition analysis (SCA), secrets detection, API security, and other code analysis tools, have been a popular...
  • Written by Thales.Artificial intelligence (AI) and cloud computing have become central to modern data environments. The convergence of these technologies promises a wealth of opportunities, enabling businesses to leverage powerful AI tools at scale and with greater efficiency. AI...
  • The Cloud Security Alliance (CSA) has established itself as the leading authority in cloud security by building deep collaborations with industry experts and pioneers in cybersecurity. Since its incorporation in 2009, CSA has worked closely with a vast network of professionals, researchers...
  • Written by Ken Huang, CEO of DistributedApps.ai and VP of Research at CSA GCR.Yesterday (September 24, 2024), I had the privilege of attending the NIST symposium “Unleashing AI Innovation, Enabling Trust.” The first day of the event had two panels. The first panel, titled “Advancing...
  • Written by David Balaban.Security and compliance are both serious issues that can keep you awake at night. In theory, they should be perfect partners, complementing each other to keep your organization resilient and its digital assets safe.Thankfully, this kind of alignment is finally...
  • Written by Vaibhav Malik, Global Partner Solutions Architect, Cloudflare.Organizations are increasingly adopting AI-native application workloads in the rapidly evolving landscape of cloud computing and AI. These innovative solutions, powered by advanced technologies like large language...
  • Written by Dan Stocker, with contributions from the CSA AI Governance and Compliance Working Group.AI and regulationIn just a short few years, artificial intelligence (AI) has gone through a massive hype cycle, and is entering a period where it will directly impact the broader population...
  • Originally published by CyberArk.Written by Sam Flaster.Privileged access management (PAM) programs aim to secure the highest-risk access in an organization, including using privileged credentials like passwords, SSH keys and application secrets. So, how can PAM and identity security...
  • Originally published by Tata Communications. Written by Rajesh Awasthi, VP & Global Head of Managed Hosting and Cloud Services, Tata Communications. India's financial sector is undergoing a profound transformation, driven by a confluence of technological advancements, regulatory...
  • Written by Abel E. Molina, Softchoice. "Those who fail to learn from history are condemned to repeat it." - W. ChurchillThe above quote feels especially pertinent in cybersecurity, where gleaning lessons from prior breaches strengthens our future defenses. With Cybersecurity Month...
  • A simple yet powerful way to break Generative AI chatbots Written by Satbir Singh, Enkrypt AI.Generative AI models have improved detecting and rejecting malicious prompts. And most models have basic safety alignment training to avoid responding to queries such as: “How can...
  • CSA's Cloud Trust Summit 2024 featured an expert panel discussion about v2 of our CCM v4.0 Implementation Guidelines. Led by CSA's Lefteris Skoutaris, the panelists included:David Skrdla, Senior IT Auditor, Internal Audit, American Fidelity Corp/CamGen PartnersKerry Steele, Principal...
  • Originally published by CXO REvolutionaries.Written by Ben Corll, CISO in Residence, Zscaler.Let's face it, folks – breaches happen. As a CISO (as much as it pains me to say), this is unlikely to change in the near future. Even organizations with the "best" defenses are occasionally...