Category Archives: Cloud Security Alliance

Category Added in a WPeMatico Campaign

Non-Human Identity Management

Originally published by Oasis.Non-human identities, or NHIs, serve as digital gatekeepers, enabling secure machine-to-machine and human-to-machine access and authentication within modern enterprise systems. The push for innovation has led to the adoption of microservices, third-party solutions, and cloud-based platforms, creating a complex web of interconnected systems. In this intricate network, NHIs are key players in […]

Cloud Security Alliance Announces 2024 Chapter Ambassadors List

Annul program recognizes individuals who best exemplify CSA valuesSEATTLE – July 11, 2024 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment, is pleased to announce its inaugural list of Chapter Ambassadors. The CSA Chapter Ambassador program annually […]

Revamping Third Party Vendor Assessments for the Age of Large Language Models

Written by MJ Schwenger, Member of the CSA AI Working Group.Originally published on LinkedIn.Introduction The increasing adoption of Large Language Models (LLMs) in the supply chain presents a new challenge for traditional Third-Party Vendor Security Assessments (TPVRAs). This blog explores how to adapt existing TPVRAs to gather critical information about the integration of LLMs within […]

How CSA Corporate Membership Enhances Your STAR Submission

In today’s digital age, cloud security is more important than ever. Organizations are looking for cloud service providers that not only meet but exceed security standards. The CSA STAR (Security, Trust, Assurance and Risk) Registry is a valuable resource that highlights service providers who adhere to these high standards. Submitting to the CSA STAR Registry […]

Bridging the Gap: How to Ensure Seamless Collaboration Between Security & Development Teams

Written by Urvi Mehta, ArmorCode.In today’s interconnected digital landscape, software serves as the backbone, driving the evolution of increasingly sophisticated applications. While this evolution fuels progress and exciting features, it also creates a vast playground for cyber threats. Simple, standalone programs are a thing of the past; today’s applications are intricate ecosystems with interconnected parts […]

Navigating the New SEC Cybersecurity Regulations in M&A Transactions

Originally published by CXO REvolutionaries.Picture this: you’ve just finalized your M&A deal, only to discover a cybersecurity incident emerging—whether it’s a breach, data leak, or system compromise. Suddenly, the clock is ticking, and you’re faced with a tight deadline to report this material event to the SEC and your stakeholders. Recent years have witnessed a […]

And now for something completely different… a Cloud Security Alliance RFI

This blog is markedly different from any other I have posted on our website. While we have responded to a few Requests for Proposal (RFP) or Requests for Information (RFI) over the past 15 years, the Cloud Security Alliance has never issued one ourselves, until now.Technology is moving at a breakneck pace, the fastest it […]

The Rise of QR Code Phishing Attacks: Exploring Quishing Threats

Originally published by Abnormal Security.Bad actors have been using phishing emails to steal sensitive data for three decades. Impersonating a trusted individual or brand and manufacturing a sense of urgency, attackers deceive targets into providing private information like login credentials or bank account details.Because email wasn’t initially designed with security in mind, early email platforms […]

Navigating IT-OT Convergence: A Strategic Imperative for Enterprise Success

Written by S Sreekumar, VP and Global Practice Head, Cybersecurity, HCLTech and José Grandmougin, Senior Director Consulting System Engineering GSI and OT, Fortinet.In the ever-evolving landscape of digital transformation, the convergence of Information Technology (IT) and Operational Technology (OT) emerges as a pivotal paradigm shift. Understanding the interconnected nature of these domains is not just […]

AI Deepfake Security Concerns

In light of the most revolutionary technology ever introduced, CSA’s SECtember.ai conference will feature three days of insightful sessions and active discussions about navigating the future of AI and cloud security. SECtember.ai will take place on September 10-12, 2024 at the Meydenbauer Center in Bellevue, WA.In preparation for this important event, members of the SECtember.ai […]