Category Archives: Cloud Security Alliance

Category Added in a WPeMatico Campaign

Rowing the Same Direction: 6 Tips for Stronger IT and Security Collaboration

Originally published by Dazz.The Olympians make it look easy, but make no mistake: rowing is a more difficult sport than meets the eye. Changing conditions in the water and weather, exhaustion, and even a head tilt in the wrong direction can send the boat off course or cause the team to lose time. And perhaps […]

How to Leverage Automation Tools to Streamline Your Next Compliance Audit: 3 Tips for Security Teams

Originally published by BARR Advisory.Compliance automation tools are designed to assist organizations in streamlining the rigorous demands of cybersecurity frameworks such as SOC 2, ISO 27001, and HITRUST. These platforms can help address the heavy lifting involved in preparing, undergoing, and maintaining compliance by automating repetitive tasks, freeing up security teams to think more strategically […]

App-Specific Passwords: Origins, Functionality, Security Risks and Mitigation

Originally published by Astrix on August 14, 2024.Written by Tomer Yahalom.Google announced it will terminate support for Less Secure Apps (LSAs) on September 30, which presents a great opportunity to dive into their evolution – App-Specific Passwords, and the security concerns that still remain.Less Secure Apps (LSAs): How it all beganLess Secure Apps (probably called […]

Reflections on NIST Symposium in September 2024, Part 2

Written by Ken Huang, CEO of DistributedApps.ai and VP of Research at CSA GCR.1. Introduction and Background On September 24, 2024, I had the privilege of attending the NIST symposium “Unleashing AI Innovation, Enabling Trust.” This event brought together leading experts, policymakers, and industry professionals to discuss the current state and future trajectory of artificial […]

Top Threat #3 – API-ocalypse: Securing the Insecure Interfaces

Written by CSA’s Top Threats Working Group.In this blog series, we cover the key security challenges from CSA’s Top Threats to Cloud Computing 2024. Drawing from the insights of over 500 experts, we’ll discuss the 11 top cybersecurity threats, their business impact, and how to tackle them. Whether you’re a professional or a beginner, this […]

AI and Data Protection: Strategies for LLM Compliance and Risk Mitigation

Originally published by Normalyze.Written by Vamsi Koduru.Artificial Intelligence is evolving at a breakneck pace, with new models and applications being deployed across industries daily. However, this rapid advancement has brought with it a host of compliance challenges.As data security methods struggle to keep up with these technological strides, the responsibility falls heavily on data security […]

Cybersecurity Risk Mitigation Recommendations for 2024-2025

Originally published by Entro.Written by Itzik Alvas, CEO & Co-founder, Entro.The Rise of Non-Human Identities Non-human identities (NHIs) such as automated systems, devices, APIs, and services, are playing an increasingly large role in IT ecosystems. These entities are essential for daily operations, yet they are most often unsecured and unobserved, presenting substantial risks. Threat actors […]

Creating a Cyber Battle Plan

Originally published by Zscaler.Nearly every day (certainly every week) the headlines scream of massive data breaches. It’s enough to make you wonder: with companies supposedly pouring resources into cybersecurity, why are cyber incidents and data breaches still on the rise? The answer, unfortunately, isn’t a simple one. Cybersecurity is a complex dance between evolving attacks […]

Why You Should Have a Whistleblower Policy for AI

Originally published by Truyo.Considering the evolving regulatory landscape surrounding artificial intelligence (AI), including the EU AI Act and potential future directives from bodies like the U.S. Department of Health and Human Services (HHS), establishing a whistleblower policy has emerged as a proactive measure for organizations. While current laws may not explicitly mandate such policies, the […]

Embracing AI in Cybersecurity: 6 Key Insights from CSA’s 2024 State of AI and Security Survey Report

Originally published by Abnormal Security.The integration of artificial intelligence (AI) into cybersecurity practices is transforming the landscape, offering both promising advancements and new challenges. The State of AI and Security Survey Report, sponsored by the Cloud Security Alliance, provides a comprehensive look into how AI is being perceived and utilized in the field of cybersecurity. […]

This site uses cookies to offer you a better browsing experience. By browsing this website, you agree to our use of cookies. Click More Info to view Privacy Policy.