Originally published by Oasis.Non-human identities, or NHIs, serve as digital gatekeepers, enabling secure machine-to-machine and human-to-machine access and authentication within modern enterprise systems. The push for innovation has led to the adoption of microservices, third-party solutions, and cloud-based platforms, creating a complex web of interconnected systems. In this intricate network, NHIs are key players in […]
Category Archives: Cloud Security Alliance
Category Added in a WPeMatico Campaign
Annul program recognizes individuals who best exemplify CSA valuesSEATTLE – July 11, 2024 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment, is pleased to announce its inaugural list of Chapter Ambassadors. The CSA Chapter Ambassador program annually […]
Written by MJ Schwenger, Member of the CSA AI Working Group.Originally published on LinkedIn.Introduction The increasing adoption of Large Language Models (LLMs) in the supply chain presents a new challenge for traditional Third-Party Vendor Security Assessments (TPVRAs). This blog explores how to adapt existing TPVRAs to gather critical information about the integration of LLMs within […]
In today’s digital age, cloud security is more important than ever. Organizations are looking for cloud service providers that not only meet but exceed security standards. The CSA STAR (Security, Trust, Assurance and Risk) Registry is a valuable resource that highlights service providers who adhere to these high standards. Submitting to the CSA STAR Registry […]
Written by Urvi Mehta, ArmorCode.In today’s interconnected digital landscape, software serves as the backbone, driving the evolution of increasingly sophisticated applications. While this evolution fuels progress and exciting features, it also creates a vast playground for cyber threats. Simple, standalone programs are a thing of the past; today’s applications are intricate ecosystems with interconnected parts […]
Originally published by CXO REvolutionaries.Picture this: you’ve just finalized your M&A deal, only to discover a cybersecurity incident emerging—whether it’s a breach, data leak, or system compromise. Suddenly, the clock is ticking, and you’re faced with a tight deadline to report this material event to the SEC and your stakeholders. Recent years have witnessed a […]
This blog is markedly different from any other I have posted on our website. While we have responded to a few Requests for Proposal (RFP) or Requests for Information (RFI) over the past 15 years, the Cloud Security Alliance has never issued one ourselves, until now.Technology is moving at a breakneck pace, the fastest it […]
Originally published by Abnormal Security.Bad actors have been using phishing emails to steal sensitive data for three decades. Impersonating a trusted individual or brand and manufacturing a sense of urgency, attackers deceive targets into providing private information like login credentials or bank account details.Because email wasn’t initially designed with security in mind, early email platforms […]
Written by S Sreekumar, VP and Global Practice Head, Cybersecurity, HCLTech and José Grandmougin, Senior Director Consulting System Engineering GSI and OT, Fortinet.In the ever-evolving landscape of digital transformation, the convergence of Information Technology (IT) and Operational Technology (OT) emerges as a pivotal paradigm shift. Understanding the interconnected nature of these domains is not just […]
In light of the most revolutionary technology ever introduced, CSA’s SECtember.ai conference will feature three days of insightful sessions and active discussions about navigating the future of AI and cloud security. SECtember.ai will take place on September 10-12, 2024 at the Meydenbauer Center in Bellevue, WA.In preparation for this important event, members of the SECtember.ai […]