Originally published by Reemo. Hybrid work has emerged as a dominant organizational model, with a significant portion of the global workforce embracing this flexible approach. While it offers numerous benefits, it also introduces complex security challenges that organizations must address to protect their valuable assets. The rise of hybrid work and its security […]
Category Archives: Cloud Security Alliance
Category Added in a WPeMatico Campaign
Originally published by Synack. New year, new regulations. In late December 2024, the U.S. Department of Health and Human Services (HHS) issued a proposal to modify the Health Insurance Portability and Accountability Act’s (HIPAA) Security Rule, with an overarching goal of strengthening the cybersecurity programs of healthcare organizations and protecting patient data from malicious adversaries. […]
Originally published by Koat. What is an AI Agent? AI agents are advanced autonomous systems designed to perform specific tasks, make decisions, and collaborate with humans and other AI systems. Unlike traditional automation tools, they have machine learning, natural language processing (NLP), and decision-making capabilities, allowing them to adapt and learn with minimal human […]
How and when you should switch to post-quantum Written by Cory Missimore of the CSA Quantum-Safe Security Working Group. Reviewed by Bruno Huttner, Mehak Kalsi, and Mahesh Adulla. NIST is helping companies and governments prepare for PQC As quantum computing technology continues to advance, so does the urgency for organizations to rethink their approach to cybersecurity. Many […]
Originally published by Abnormal Security. Since the public release of ChatGPT two years ago, the field of artificial intelligence has grown tremendously in both good ways and bad. There’s no denying that the rapid evolution of AI has brought transformative benefits to numerous fields, including cybersecurity. But it has also introduced new challenges as […]
Written by Joseph Wilson and the CSA FHE Working Group. Questions of privacy and security are at the forefront of every deployment of Fully Homomorphic Encryption (FHE). In this blog post, we provide insight that will help you to evaluate FHE solutions when answering the following questions: Is this solution secure? Who says so, […]
Written by Neelakantan Venkataraman, Vice President & Global Head of Cloud & Edge Business, Tata Communications. Originally published by Frontier Enterprise. The world is captivated by AI’s impressive deployment, but the real profits lie in reassessing operational models. As Singapore’s Minister for Digital Development and Information, Josephine Teo, noted, an internationally agreed-upon framework for AI governance […]
Written by Richard Beck, Director of Cyber Security, QA Ltd. AI security governance is fast becoming the boardroom’s new obsession, and with good reason. From biased models and hallucinated outputs to intellectual property leakage and regulatory scrutiny, the risks of unchecked AI are multiplying by the day. The challenge ahead of us is how we […]
Originally published by Vanta. Our most recent State of Trust report found that 55 percent of global businesses think security risks for their organization have never been higher. Naturally, to mitigate an increase in risks in today’s complex threat landscape, businesses invest time and money in building a robust cybersecurity posture. But many security initiatives take […]
Written by Gerry Gebel, VP of Products and Standards, Strata. Working directly with organizations that are navigating the complexities of multi-cloud environments, one thing has become clear: managing identities across cloud and on-prem systems isn’t getting any easier. Whether it’s ensuring governance, improving visibility, or building resilience, many companies still struggle to get a firm […]