Category Archives: Cloud Security Alliance

Category Added in a WPeMatico Campaign

Building Security Around Human Vulnerabilities

Written by Benjamin Corll, CISO in Residence, Zscaler.Why are organizations spending money on cybersecurity solutions when studies show 88% of data breaches are caused by human mistakes? If you’re a cybersecurity leader you have probably heard some variation of this question from people skeptical of our industry. The implication is that it’s unwise to buy […]

EU AI Act Introduces Unique Tiered System for Risks

Originally published by Truyo.With the full text of the EU AI Act made public, Truyo President Dan Clarke read through the Act in its entirety to identify key elements that will be crucial to compliance for organizations in scope. The Act includes the conventional components of transparency, privacy, education, security, non-discrimination, and risk assessment.Where it […]

PCI DSS for Security Leaders – How to Take a Proactive Approach

Originally published by Schellman&Co.If you’re a newly hired CISO or Director for an organization that’s required to achieve and maintain PCI DSS, you may be wondering how and where you can get started so that you’re ready when it comes time for the assessment to begin.No one wants to hear, “I’m putting you in charge […]

CSA Community Spotlight: Leading Critical Discussions with Vishwas Manral

Celebrating our 15th anniversary this year, CSA stands as the premier authority in promoting and defining best practices for a secure cloud computing environment. Since its inception in 2009, CSA has grown to offer an extensive array of frameworks, research publications, assurance programs, trainings, certificates, and more. These achievements are a testament to the unwavering […]

From the Trenches: A CISO’s Guide to Threat Intelligence

Originally published by CXO REvolutionaries.Written by Ben Corll, CISO in Residence, Zscaler.Let’s face it, our jobs as CISOs are a constant dance with the shadows. We fight invisible enemies, anticipate the next attack, and strive to stay one step ahead of ever-evolving threats. That’s where threat intelligence comes in – it’s the intel that fuels […]

What We Know About Vulnerability Exploitation in 2024 (So Far)

Originally published by Dazz.Written by Noah Simon, Head of Product Marketing, Dazz.In the world of security vulnerabilities, change is the only constant. There are always new CVEs, new exploits, and new threat actors. A recent study estimates that there will be a 25% increase in vulnerabilities, or roughly 2,900 per month in 2024.With so many […]

SASE and Zero Trust PAM: Why Enterprises Need Both

Written by StrongDM.Enterprise security and compliance teams must maintain constant awareness of all activities across their entire environment involving every user. Regulatory requirements, along with internally set policies and controls, demand thorough knowledge and understanding to effectively manage and secure their infrastructure. To achieve this, enterprises often turn to advanced security frameworks like Secure Access […]

Risk Management in the Age of Artificial Intelligence: 9 Questions to Ask Your AI-Powered Vendors

Originally published by BARR Advisory.Artificial intelligence (AI) presents organizations across industries with the opportunity to streamline their workflows, better secure their systems, and solve some of the world’s most pressing issues. But while AI has the potential to offer huge benefits to businesses, it doesn’t come without risk.“AI can be a useful tool, but business […]

AWS S3 Bucket Security: The Top CSPM Practices

Written by ArmorCode.An S3 bucket is a fundamental resource in Amazon Web Services (AWS) for storing and managing data in the cloud. S3 stands for “Simple Storage Service,” providing scalable, durable, and highly available object storage.S3 is widely used for various purposes, such as storing backups, hosting static websites, serving as a data lake for […]