A hardware security module (HSM) is a trusted platform for performing cryptographic operations and protecting keys. A main feature of the HSM architecture is its special co-processor that performs cryptography functions. HSMs also consist of a hardware-based random number generator, RAM, storage, and external interface. HSM-as-a-Service is a growing market, with many organizations using it […]
Category Archives: Cloud Security Alliance
Category Added in a WPeMatico Campaign
Update strengthens CCM’s position as the cloud security industry’s preferred control frameworkSEATTLE – June 4, 2024 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment, has issued Cloud Controls Matrix (CCM) Implementation Guidelines v2.0: Securing the Cloud with […]
CSA’s Security, Trust, Assurance and Risk (STAR) program is in its 13th year and is one of the offerings we have developed that I am most proud of. I would even go so far as to say we are the gold standard for cloud provider assurance, as our public registry contains listings for over 2,500 […]
Despite economic uncertainty, organizations are prioritizing SaaS security investmentGartner Security and Risk Management Summit, National Harbor, Maryland – June 4, 2024 – Seventy percent of organizations have prioritized investment in SaaS security, establishing dedicated SaaS security teams, despite economic uncertainty and workforce reductions. This was a key finding in the fourth Annual SaaS Security Survey […]
I’ve worked for some notable early-stage startup companies that sought to do business with Fortune 500 companies. I clearly remember the challenges of demonstrating how you can protect their customer data. SOC 2 compliance for startups can be a massive undertaking.When you have a compelling solution, as many of CSA’s Startup Members do, you often […]
Written by Gökhan Polat, Member of the CSA Blockchain Working Group.Trust serves as the cornerstone of strong human relationships, fostering security, effective communication, cooperation, and emotional intimacy. In today’s business landscape, trust is paramount, especially in the digital realm where digital trust plays a vital role. It encompasses security, privacy, dependability, and ethical considerations, acting […]
Written by the CSA DevSecOps Working Group.Cloud computing has heightened security challenges, with frequent breaches stemming from insecure applications and poor infrastructure. Similarly, as software development speeds up, the complexity and number of attacks and data breaches also rise.Secure DevOps (or DevSecOps) addresses these challenges by embedding security into the development and operational processes. Secure […]
Originally published by Pentera.Over the past two years, a shocking 51% of organizations surveyed in a leading industry report have been compromised by a cyberattack. Yes, over half. And this, in a world where enterprises deploy an average of 53 different security solutions to safeguard their digital domain. Alarming? Absolutely.A recent survey of CISOs and […]
Originally published by Truyo.In an age bursting with technological advances, the European Union has taken a pioneering step toward shaping the future of Artificial Intelligence (AI) governance. Enter the landmark Artificial Intelligence Act—a comprehensive regulatory framework penned to strike a delicate balance between fostering innovation, protecting fundamental rights, and ensuring ethical AI deployment. As we […]
Originally published by Abnormal Security.Written by Mick Leach.In the cybersecurity world, Security Operations Center (SOC) analysts serve as watchful defenders, tasked with the critical mission of fortifying systems against malicious intrusions and swiftly responding to emerging threats. Central to their effectiveness is the mastery of time management, as the fast-paced nature of cybersecurity demands rapid […]