Category Archives: Cloud Security Alliance

Category Added in a WPeMatico Campaign

CISOs, Sewers, and Unsolvable Problems

Originally published by CXO REvolutionaries.Written by Daniel Ballmer, Senior Transformation Analyst, Zscaler.CISOs and sewer engineers face similar challenges, and it goes beyond keeping the contents of their systems moving fast and smooth. There is a mathematical exercise that has many names, but I learned it as the New York City Sewer Problem. In short, it […]

Zero Trust: Win Friends, Influence People, and Improve Your Organizational Maturity

Written by the CSA Zero Trust Working Group Co-Chairs: Jason Garbis, Jerry Chapman, and Christopher Steffen. In our roles as co-chairs, we spend a lot of time and energy talking with enterprises and promoting the idea that Zero Trust needs to be more than just a security initiative – it has to deliver business value […]

AI Safety vs. AI Security: Navigating the Commonality and Differences

Written by Ken Huang, Co-Chair of Two CSA AI Safety Working Groups, VP of Research of CSA GCR, and CEO of Distributedapps.ai. 1: Introduction AI safety and security are fundamental aspects that play distinct yet interconnected roles in the development and deployment of AI systems. AI security primarily revolves around safeguarding systems to ensure confidentiality, […]

National Cybersecurity Authority Drives Saudi Arabia’s Essential Controls Framework (ECC)

Written by AuditCue.The Kingdom of Saudi Arabia’s Essential Cybersecurity Controls (ECC), established by the National Cybersecurity Authority (NCA), is a significant leap towards enhancing the nation’s cyber defense mechanisms. This set of regulations spans across five critical domains, emphasizing a holistic approach to cybersecurity governance, defense, resilience, third-party/cloud computing, and industrial control systems. With a […]

Understanding and Preventing Business Email Compromise

Originally published by CXO REvolutionaries.Written by Gary Parker, CTO in Residence, Zscaler.Businesses of all sizes face a growing cybersecurity and financial threat known as business email compromise (BEC) simply because they use email. BEC attacks have become increasingly sophisticated, posing significant risks to all organizations. This article explores the potential effects of BEC and provides […]

Lessons Learned from HIPAA Compliance Breaches

Originally published by BARR Advisory.Written by Claire McKenna. According to the Department of Health and Human Services (HHS) Office for Civil Rights (OCR), there has been a considerable upward trend in healthcare data breaches since the office began tracking data breach statistics in 2009. You may remember some of the most notable data breaches—such when […]

Cybersecurity Regulations and the Impact on Consumers

Originally published by RegScale.The theme for this year’s Cybersecurity Awareness Month, “Secure Our World,” underscores the importance of cybersecurity in our daily lives. This theme serves as a reminder that despite the convenience and connectivity of the digital age, there are inherent risks involved.As consumers, we must navigate a complex online landscape where our personal […]

CSA Community Spotlight: Propelling the Industry Forward with Larry Whiteside Jr.

Now 15 years old, the Cloud Security Alliance (CSA) is the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment. In 2009, CSA was officially incorporated and we released the first version of our Security Guidance. In the years since, we’ve debuted a wealth […]

The Implications of AI in Cybersecurity – A Transformative Journey

The emergence of Artificial Intelligence (AI) stands as both a beacon of hope and a subject of intricate debate. This transformative technology, with its dual-edged potential, demands a careful examination of its implications in the realm of cybersecurity. The integration of AI into cybersecurity heralds a new era of digital defense, promising enhanced capabilities in […]

Phishing in Azure Cloud: A Targeted Campaign on Executive Accounts

Originally published by Adaptive Shield.Written by Hananel Livneh.In recent weeks, a concerning wave of cyber attacks has been targeting Microsoft Azure environments, compromising crucial user accounts, including those of senior executives. Proofpoint researchers have identified an ongoing malicious campaign, which utilizes sophisticated techniques like credential phishing and cloud account takeover (ATO). This blog post will […]