Category Archives: Cloud Security Alliance

Category Added in a WPeMatico Campaign

Implementing CCM: Human Resources Controls

The Cloud Controls Matrix (CCM) is a framework of controls that are essential for cloud computing security. It is created and updated by CSA and aligned to CSA best practices. You can use CCM to systematically assess and guide the security of any cloud implementation. CCM also provides guidance on which actors within the cloud […]

8 Questions to Ask Your Security Vendors About AI

Originally published by Abnormal AI. Written by Emily Burns.   The rapid integration of artificial intelligence (AI) into cybersecurity solutions has created both opportunities and challenges. AI-driven systems promise advanced threat detection, automation, and adaptability, but as a buyer, how can you make sure you’re choosing the right AI-powered tools? Here are a few key questions […]

Shields Up: What IT Professionals Wish They Knew About Preventing Data Breaches

Originally published by Axway. Written by Chris Payne, Principal Product & Solutions Marketing Manager for Axway MFT.   There’s an old IT saying that nobody notices MFT until something goes wrong. MFT hums along in the background at many enterprises, running on autopilot, out of sight and out of mind. No need to modernize, update or […]

5 Trust Trends Shaping Security Strategies in 2025

Originally published by Vanta.  Written by Jess Munday.   Trust is critical to the success of every business. And in 2024, we saw that building, scaling, and demonstrating trust is getting more difficult for organizations. Vanta’s second annual State of Trust Report uncovered key trends across security, compliance, and the future of trust. Based on a survey […]

Cloud and SaaS Security in Critical Infrastructure: Lessons from Recent Attacks

Originally published by CheckRed. Written by Amardip Deshpande, Senior Security Researcher at CheckRed.   Cyberattacks on critical infrastructure have become a growing concern, with sectors like water supply, energy, and other essential utilities increasingly in the crosshairs of cybercriminals and nation-state actors. The recent cyberattack on American Water proves that these vital services are not immune […]

Agentic AI: Understanding Its Evolution, Risks, and Security Challenges

Originally published by TrojAI. Written by Phil Munz.   The evolution of agentic AI systems Agentic systems – software systems composed of multiple interacting agents – have been used to solve complex problems for many years. The field of AI safety has grown around agentic systems to study the risks inherent in these systems.  With […]

Cybersecurity for SMBs: Statistics and Threats You Can’t Afford to Ignore

Originally published by VikingCloud.   Small and medium-sized businesses (SMBs) play a crucial role in the U.S. economy, making up 99.9% of all businesses and contributing to half of the nation’s GDP. However, these vital economic growth drivers face an escalating threat —cyberattacks that could put them out of business. Nearly 1 in 5 SMBs […]

Unpacking the 2024 Snowflake Data Breach

CSA’s Top Threats to Cloud Computing Deep Dive 2025 reflects on eight recent real-world cybersecurity breaches. The report presents each incident as both a detailed narrative and as a threat model with the relevant cloud security risks and mitigations. Today we’re taking a closer look at the first incident covered in the Deep Dive: Snowflake […]

Taming the Beast: The 5 Essential Pillars of SaaS Security

Originally published by Valence. Written by John Filitz.   Generative AI represents just one element of the broader SaaS revolution transforming enterprise IT. Most organizations are becoming SaaS-first enterprises, permanently displacing centralized IT architectures. This decentralized environment creates significant challenges for security teams striving to maintain cyber resilience. Manual security audits cannot keep pace with daily […]

Securing the Media Industry

Originally published by CXO REvolutionaries. Written by Kavita Mariappan, Former EVP, Customer Experience and Transformation, Zscaler.   A zero trust strategy can help media companies protect their assets, ensure the authenticity of their content, and build a more resilient future in the digital age. The media industry faces many of the same threats faced by other […]

This site uses cookies to offer you a better browsing experience. By browsing this website, you agree to our use of cookies. Click More Info to view Privacy Policy.