Category Archives: Cloud Security Alliance

Category Added in a WPeMatico Campaign

Cloud Security Alliance and Whistic Partner to Advance Secure and Responsible Development of Artificial Intelligence (AI) Technologies

Organizations collaborate on mutual goal of evaluating risks and defining controls related to Generative Artificial IntelligenceSEATTLE – Jan. 20, 2025 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment, and Whistic, the leading AI-first modern platform for […]

Unlocking the Power of AI: An Intro to Prompt Engineering

Artificial Intelligence (AI) has become a cornerstone of innovation, transforming industries and reshaping how we interact with technology. At the heart of this revolution lies Large Language Models (LLMs)—AI systems designed to understand and generate human-like text.However, even the most advanced AI needs direction from a human to perform effectively. Enter prompt engineering, the art […]

The EU AI Act: A New Era of AI Governance Began August 1st

Originally published by Truyo.Written by Dan Clarke.The European Union’s AI Act, which entered into force August 1, 2024, marks a historic milestone as the world’s first comprehensive regulation for artificial intelligence. This groundbreaking legislation, initially agreed upon in December 2023, aims to establish a robust framework for AI development and deployment, ensuring that technology advancements […]

Secrets & Non-Human Identity Security in Hybrid Cloud Infrastructure: Strategies for Success

Written by Itzik Alvas, Entro.Secrets & Non-Human Identities (NHIs) security in hybrid cloud environments is a critical challenge in today’s IT landscape. Passwords, API keys, certificates, and tokens are not just digital assets; they are the lifeblood of your organization’s security. Protecting these non-human identities is essential for maintaining the integrity of your infrastructure. This […]

The Emerging Cybersecurity Threats in 2025 – What You Can Do To Stay Ahead

Contributed by Softchoice.Written by Abel E. Molina, Principal Architect, Security, Microsoft.As we look ahead to 2025, the landscape of cyber threats is evolving at a rapid pace, posing significant challenges for businesses, governments, and individuals. As the first blog of the year, I felt it appropriate to list the top 10 emerging cybersecurity threats of […]

How Illumio Simplified eBay’s Large-Scale Microsegmentation Project

Originally published by Illumio.For global e-commerce giant eBay, the cybersecurity stakes couldn’t be higher. It manages millions of transactions and customer interactions every day. The company’s success is built on buyers’ and sellers’ trust in its platform. This is why eBay turned to Illumio for microsegmentation. It wants to make sure potential breaches and ransomware […]

The Trouble with Large Language Models and How to Address AI “Lying”

Originally published by Schellman.Written by Avani Desai, CEO, Schellman.Even as AI systems become more advanced and enmeshed in daily operations, concerns regarding whether large language models (LLMs) are generating accurate and true information remain paramount throughout the business landscape. Unfortunately, the potential for AI to generate false or misleading information—often referred to as AI “hallucinations”—is […]

Adapting Strong IAM Strategies to Combat AI-Driven Cyber Threats

Written by Jordi Vilanova, Cloudtango.In early 2024, T-Mobile experienced a significant data breach where attackers exploited weak IAM controls to gain access to the personal information of over 30 million customers. The attackers used a combination of phishing attacks and stolen credentials to bypass security measures. This incident led to sensitive data, including names, addresses, […]

Your Essential 10-Step GDPR Compliance Checklist

Originally published by Vanta.Written by Jess Munday.If your business entails collecting and/or processing the personal data of European Union (EU) or United Kingdom (UK) citizens, complying with the General Data Protection Regulation (GDPR) is a priority.‍The regulation is quite comprehensive and includes numerous requirements your organization must implement. Adapting to its various requirements around transparency, […]

Navigating Cloud Challenges with Repatriation

Written by Rajesh Awasthi, VP & Global Head of Managed Hosting and Cloud Services, Tata Communications.Originally published by DQ India.Cloud computing has transformed business operations with its scalability, flexibility, and cost-efficiency, encouraging organisations to modernise their IT infrastructure. According to Gartner’s, latest forecast, spending by end-users on public cloud services is expected to grow 20.4% […]