This working group aims to develop Zero Trust standards to achieve consistency for cloud, hybrid and mobile endpoint environments. The topic of group discourse include Zero Trust benefits, ...
Written by Troy Leach, Chief Strategy Officer (CSO), CSA. We require a modern approach to accurately assess our use of current technology. This month marks 25 years since I managed my first ...
CSA EMEA Congress 2019 TBD June 3, 2019 Download presentations CSA Colorado Chapter Forum 2019 TBD June 3, 2019 Download presentations CSA Summit at (ISC)² Security Congress 2019 TBD June 3, 2019 ...
Written by Erick Tauil, Presales Engineer. Alright, let’s dive into a topic that often feels like a riddle wrapped in an enigma: Zero Trust. Communicating its concepts to non-security stakeholders can ...
Findings emphasize the importance of regulatory compliance, strategic cloud adoption, regional considerations, and the need for continuous improvement in security practices SEATTLE – Dec. 10, 2024 – ...
Written by B. Mani Shankar, Global Manager – MDR, Cyber Threat Intel & Incident Response Services, Cybersecurity, HCLTech. In today’s hyper-connected digital landscape, cyber threats have become more ...
The Volt Typhoon campaign has raised alarms across cybersecurity circles, targeting critical infrastructure with stealthy and sophisticated techniques. This analysis breaks down the methods, ...
Originally published by Scrut Automation. Written by Nicholas Muy, Chief Information Security Officer, Scrut Automation. On July 12, 2024, the European Union (EU) Official Journal published the full ...
Founded in 2013 by the Cloud Security Alliance, the Security Trust Assurance and Risk (STAR) registry encompasses key principles of transparency, rigorous auditing, and cloud security and privacy best ...
Governance, Risk, and Compliance (GRC) demands continuous adaptation and vigilance, transcending its role as a mere business necessity. In the ever-changing world of compliance, companies are often ...
Originally published by CXO REvolutionaries. Written by Mike Gemza, CTO, Cornerstone Building Brands. At a time when cyberthreats are becoming more advanced and network infrastructure needs are ...
Written by CSA’s Top Threats Working Group. In this blog series, we cover the key security challenges from CSA's Top Threats to Cloud Computing 2024. Drawing from the insights of over 500 experts, ...