Originally published by Scrut Automation.Written by Nicholas Muy, Chief Information Security Officer, Scrut Automation.On July 12, 2024, the European Union (EU) Official Journal published the full text of the AI Act. This set into motion the final chapter of the most impactful security and privacy law since the General Data Protection Regulation (GDPR) came into […]
Category Archives: Cloud Security Alliance
Category Added in a WPeMatico Campaign
Originally published by Vanta.The security and compliance landscape is ever-evolving, meaning the demands organizations need to meet today can change rapidly. While most IT teams have defined processes to handle these requirements, they may not have the capacity to address all the tasks necessary to maintain the organization’s security posture.If your organization has encountered a […]
Originally published by InsiderSecurity.The Volt Typhoon campaign has raised alarms across cybersecurity circles, targeting critical infrastructure with stealthy and sophisticated techniques. This analysis breaks down the methods, exploitation tactics, and practical defenses organizations can employ to safeguard their systems.Volt Typhoon Attacks On May 24, 2023, Microsoft and the “Five Eyes Alliance” cybersecurity information sharing organization […]
Written by Rahul Kalva.Abstract In today’s fast-paced DevOps environment, the demand for agile infrastructure deployment is driving innovation beyond traditional Infrastructure-as-Code (IaC). Code-less deployment solutions represent a breakthrough, enabling teams to automate infrastructure setup without the need for extensive coding. This article explores how code-less automation improves deployment efficiency while maintaining robust security and compliance. […]
Written by Ken Huang, CEO of DistributedApps.ai and VP of Research at CSA GCR.Everyone seems to talk about Test-Time Computation or Test Time Compute (TTC) as a way to scale the reasoning capability of large language models (LLMs). What is it about and why is it important now? This blog post is an attempt to […]
Written by Kayla Mauriello.Seasoned cybersecurity professionals from CTOs to developers are facing a challenging situation: organizations transitioning to new cloud architecture are invariably exposed to new vulnerabilities that traditional security measures don’t address. Keeping pace with the evolution of cloud infrastructure security techniques and principles requires a new approach and upgraded skill sets.The Cloud Infrastructure […]
Findings emphasize the importance of regulatory compliance, strategic cloud adoption, regional considerations, and the need for continuous improvement in security practices SEATTLE – Dec. 10, 2024 – Financial institutions (FIs) are cautiously but increasingly adopting cloud technologies, while simultaneously placing greater value on multi-cloud strategies in order to avoid vendor lock-in and enhance data sovereignty, […]
Originally published by Scrut Automation.Written by Amrita Agnihotri.A growing wave of AI-related legislation and regulation is building, with the most significant example being the European Union’s (EU) Artificial Intelligence (AI) Act. In March 2024, European leaders passed this sweeping legislation into law.It will clearly have huge impacts on the way business is done, both in […]
Written by Ken Huang, CEO of DistributedApps.ai and Co-Chair of AI Safety Working Groups at CSA.There is no clear and consensus definition of what an AI agent is in the literature. This article does not aim to define what an AI agent is. Rather, I focus on examining AI agents from a range of capabilities, […]
Now celebrating 15 years of advancing cloud security, the Cloud Security Alliance (CSA) is proud to be the world’s leading organization dedicated to defining best practices for a secure cloud computing environment. Since our incorporation in 2009 and the release of our inaugural Security Guidance, CSA has expanded our impact through a broad portfolio of […]