Category Archives: Cloud Security Alliance

Category Added in a WPeMatico Campaign

What are OAuth Tokens, and Why are They Important to Secure?

Originally published by Astrix.What are OAuth Tokens? OAuth (Open Authorization) Tokens are Non-Human Identities that work as a secure authentication mechanism. They delegate access to third parties or external apps without exposing your environment’s sensitive credentials. Organizations that rely on third-party applications and service integrations in their environments commonly use OAuth tokens. There are different […]

7 Essential SaaS Security Best Practices

Originally published by Suridata.No More SaaS Security TradeoffsIf your organization is like most, you are probably using upwards of a hundred Software-as-a-Service (SaaS) applications. The reasons for this are many, including convenience, instant access to enterprise software, and flexibility. On the downside, SaaS security has proven to be a challenge, even if you have robust […]

A Step-by-Step Guide to Improving Large Language Model Security

Originally published by Normalyze.Written by Ravi Ithal.Over the past year, the buzz around large language models (LLMs) has skyrocketed, prompting many of our customers to ask: How should we think about securing AI? What are the security implications? To answer these questions, it’s good to actually go into learning how LLMs operate. So, let’s start […]

An IT Veteran’s Guiding Principles for Successfully Implementing Zero Trust

Originally published by CXO REvolutionaries.Written by Guido Sacchi, Former Senior Executive Vice President and Chief Information Officer, Global Payments.Over the course of my career as a consultant, executive, and advisor, I have spent a good deal of time reflecting on my personal imperatives for making IT initiatives successful. What guiding principles, honed over multiple decades […]

Responding to Cyberattacks—Creating a Successful Contingency Plan

Originally published by BARR Advisory.In today’s digital age, all organizations are exposed to some level of risk. As a baseline, companies are expected to have appropriate controls and safeguards in place to protect their customer’s information—but even the most well-postured organizations may still fall victim to cyberattacks. A report by Vanta reveals that over two-thirds […]

7 Most Commonly Asked PCI Compliance Questions

Originally published by CyberGuard Compliance.Ignorance is not an excuse for failing a PCI DSS audit or, worse yet, being victimized by a data breach. The Payment Card Industry Data Security Standard (PCI DSS) clearly defines responsibilities and guidelines for protecting sensitive information such as credit card numbers.Your company must comply with the PCI DSS if […]

Pioneering Transparency: Oklahoma’s Proposed Artificial Intelligence Bill of Rights

Originally published by Truyo.In the ever-evolving landscape of technology, the emergence of artificial intelligence (AI) has brought both promise and challenge. With AI permeating various aspects of our lives, from customer service interactions to content creation, ensuring transparency, accountability, and user control becomes paramount. Recognizing this need, Oklahoma stands at the forefront of innovation with […]

The DORA Quest: Beware of Vendors with Magic Beans

Originally published by Own Company.Written by Matthew O’Neill, Field CTO, Own Company.You can’t escape the sheer volume of vendors sharing information about the Digital Operational Resilience Act (DORA) and how buying their tooling will make you compliant, which we all know is nonsense. DORA is upon us, and crafting the right outcome will require new […]

Zero Footprint Attacks: 3 Steps to Bypass EDR with Reflective Loading

Originally published by Pentera.EDR (Endpoint Detection and Response) evasion techniques are becoming increasingly common amongst attackers as they evolve their strategies to bypass security measures without being detected. There are many different types of EDR evasion techniques, many of which are listed on the MITRE ATT&CK website. The complexity and evolution of these methods vary […]

Five Levels of Vulnerability Prioritization: From Basic to Advanced

Originally published by Dazz.Vulnerabilities are being disclosed at record pace. Since the common vulnerabilities and exposures (CVE) program was established by MITRE in 1999, there have been over 300,000 unique vulnerabilities published – and a significant portion of these have been found in the last few years.Since many of these vulnerabilities are disclosed in software […]

This site uses cookies to offer you a better browsing experience. By browsing this website, you agree to our use of cookies. Click More Info to view Privacy Policy.