Category Archives: Cloud Security Alliance

Category Added in a WPeMatico Campaign

The Top Ten IT Outages in History

Editorial Note: The lessons learned and changes that may result from the CrowdStrike incident may take quite some time to fully understand. CSA is providing a platform for member experts to weigh in on this issue. The opinions of this article represent those of the member, not those of CSA.Written by Javier Perez, Sr. Director […]

Can You Have Bulletproof Security Without Network Lag? Unveiling the Secret

Written by Vaibhav Dutta, Associate Vice President and Global Head – Cybersecurity Products & Services, Tata Communications. Originally published by CRN.Securing a modern enterprise network can feel like a high-wire act. Complex security measures, can slow down critical applications, hindering operational efficiency and productivity. Conversely prioritising ease of application access and performance over security can […]

The State of Cyber Resiliency in Financial Services

Written by Troy Leach, Chief Strategy Officer and John Yeoh, Global VP of Research, CSA. Global disruptions, changing regulatory oversight, and emerging AI threats are just some of the issues that cybersecurity professionals must prepare for today. In the upcoming report “Cloud Resiliency in Financial Services,” CSA analyzed industry-wide survey data to identify the key […]

14 Essential Steps to a Secure Salesforce Environment

Originally published by Suridata.IntroductionSalesforce.com has been so successful that we tend to forget what a breakthrough it was when it debuted 25 years ago. At the time, people were skeptical that you could get enterprise-grade functionality on a browser. They were mistaken. The software-as-a-service (SaaS) revolution that Salesforce had a key role in launching is […]

Building a Fortress of ‘Never Trust, Always Verify’: The Power of Zero Trust Architecture

Originally published by CXO REvolutionaries.Written by Ben Corll, CISO in Residence, Zscaler.There’s no succinct instruction manual for zero trust architecture, but here’s the next best thing Recent headlines about critical vulnerabilities plaguing VPNs and other legacy infrastructure are a sign that the traditional “castle-and-moat” approach to network security – perimeter-based defenses and implicit trust within […]

What are Machine Credentials, And Why Are They Important to Secure in Your Organization?

Originally published by Astrix.WHAT are Machine Credentials?Machine Credentials are a collective noun for Non-human Identities that operate as digital access keys used by systems. They are used to authenticate and communicate securely with other applications or services in the organization’s environment. By verifying a machine’s unique identity, machine credentials allow safe, agreed-upon interaction. Machine credentials […]

Cloud Security Alliance Incorporates Strategy Domain into Scope of Certificate of Competence in Zero Trust (CCZT) Exam

Addition ensures security professionals are best prepared to implement and manage their Zero Trust environmentsSEATTLE – Aug. 27, 2024 – To better equip professionals with the essential knowledge they need to understand and implement Zero Trust principles, the Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and best practices to […]

Securing the Future of HPC: Implementing Zero Trust and Strengthening Network Security

Written by CSA’s High Performance Computing Working Group. High-Performance Computing (HPC) systems are pivotal in driving scientific research and innovation, offering computational power that exceeds conventional computing architectures. However, the complexity and scale of these systems introduces unique security challenges that must be addressed to protect sensitive data and maintain research integrity. As HPC environments […]

Understanding the Differences Between Fully Homomorphic Encryption and Confidential Computing

Written by Ryan Gifford, Jez Goldstone, and Joseph Wilson.In the realm of data security and privacy, Fully Homomorphic Encryption (FHE) and Confidential Computing are two cutting-edge technologies that have garnered significant attention. While both aim to protect sensitive information, they do so in fundamentally different ways and are suited for various use cases. Depending on […]

Colorado Artificial Intelligence Act Passes with Affirmative Defense Provision

Originally published by Truyo.In a groundbreaking move, Colorado is poised to become the pioneer state in regulating the use of high-risk artificial intelligence (AI) systems. The Colorado Artificial Intelligence Act (SB 205), recently passed by the state legislature, represents a significant step forward in addressing the complex ethical and legal implications of AI technology. If […]

This site uses cookies to offer you a better browsing experience. By browsing this website, you agree to our use of cookies. Click More Info to view Privacy Policy.