Originally published by VikingCloud. Written by Natasja Bolton. If your business processes payment card data, you’ve likely been working on transitioning from PCI DSS v3.2.1 to PCI DSS v4.x—but the work isn’t over yet. While the initial readiness deadline for PCI DSS v4.0 was March 31, 2024, many of the most critical security changes […]
Category Archives: Cloud Security Alliance
Category Added in a WPeMatico Campaign
Originally published by CXO REvolutionaries. Written by Ritesh Agrawal, VP of Product Management at Zscaler and Co-Founder of Airgap. There is a reason that a compromise of one smartphone doesn’t lead to a breach of every smartphone’s security: microsegmentation. Telecom companies use this ‘network of one’ strategy to isolate devices and protect against threats spreading them and […]
Originally published by Scrut Automation. Written by Amrita Agnihotri. Cyber threats in healthcare are rising at an alarming rate. Over the past five years, hacking-related breaches have surged by 256%, with ransomware incidents up by 264%, according to the U.S. Department of Health and Human Services (HHS). To combat these growing risks, covered entities and […]
Originally published by CheckRed. Written by Amardip Deshpande, Senior Security Researcher, CheckRed. Cloud and SaaS identities are not just about people. They also include the digital personas of applications, services, and machines. These digital identities are crucial for managing access and ensuring security in modern cloud environments. Understanding Human Identities In the context of […]
Award-winning program named finalist for Best Professional Certification Program SEATTLE – April 9, 2025 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment, is proud to announce that its award-winning Certificate of Competence in Zero Trust (CCZT) has […]
Originally Published by Koat. Summary Disinformation’s Impact on Reputation and Finances: Disinformation can severely damage a company’s reputation, erode consumer trust, and lead to significant financial losses. False narratives, such as rumors about product defects or unethical practices, can undermine brand integrity and customer loyalty. Role of Threat Intelligence in Combatting Disinformation: Threat intelligence […]
Originally published by Schellman. Written by Tu Nguyen. If you’ve seen the news lately, you know that breaches stemming from third-party vendors are on the rise, and it seems no organization is truly safe. Whether you’re still actively contracted with a third party or have ceased providing services, recent incidents prove you’re still at risk, […]
Originally published by Valence. Written by Jason Siberman. The rise of SaaS applications has transformed the way organizations operate, enabling greater collaboration, agility, and efficiency. Business-critical tools such as Salesforce, HubSpot, Workday, NetSuite, and GitHub are essential for departments like sales, marketing, HR, finance, and R&D. These tools empower teams to work independently, adopt […]
Originally Published by Barr Advisory on February 7, 2025. New cybersecurity requirements are fast approaching for organizations that process payment card transactions. In 2022, the PCI Security Standards Council (SSC) introduced PCI DSS 4.0 (now 4.0.1), a major update to the framework that expanded the list of mandatory security controls and introduced greater flexibility for businesses […]
Written by Eleftherios Skoutaris. The landscape of cloud security compliance is constantly evolving, and the U.S. Federal Risk and Authorization Management Program (FedRAMP) is no exception. As highlighted recently, FedRAMP will be undergoing a significant transformation with the rollout of FedRAMP 20x, aiming to modernize and streamline the authorization process for Cloud Service Providers (CSPs) working […]