Category Archives: Cloud Security Alliance

Category Added in a WPeMatico Campaign

How CSA Corporate Membership Enhances Your STAR Submission

In today’s digital age, cloud security is more important than ever. Organizations are looking for cloud service providers that not only meet but exceed security standards. The CSA STAR (Security, Trust, Assurance and Risk) Registry is a valuable resource that highlights service providers who adhere to these high standards. Submitting to the CSA STAR Registry […]

Bridging the Gap: How to Ensure Seamless Collaboration Between Security & Development Teams

Written by Urvi Mehta, ArmorCode.In today’s interconnected digital landscape, software serves as the backbone, driving the evolution of increasingly sophisticated applications. While this evolution fuels progress and exciting features, it also creates a vast playground for cyber threats. Simple, standalone programs are a thing of the past; today’s applications are intricate ecosystems with interconnected parts […]

Navigating the New SEC Cybersecurity Regulations in M&A Transactions

Originally published by CXO REvolutionaries.Picture this: you’ve just finalized your M&A deal, only to discover a cybersecurity incident emerging—whether it’s a breach, data leak, or system compromise. Suddenly, the clock is ticking, and you’re faced with a tight deadline to report this material event to the SEC and your stakeholders. Recent years have witnessed a […]

And now for something completely different… a Cloud Security Alliance RFI

This blog is markedly different from any other I have posted on our website. While we have responded to a few Requests for Proposal (RFP) or Requests for Information (RFI) over the past 15 years, the Cloud Security Alliance has never issued one ourselves, until now.Technology is moving at a breakneck pace, the fastest it […]

The Rise of QR Code Phishing Attacks: Exploring Quishing Threats

Originally published by Abnormal Security.Bad actors have been using phishing emails to steal sensitive data for three decades. Impersonating a trusted individual or brand and manufacturing a sense of urgency, attackers deceive targets into providing private information like login credentials or bank account details.Because email wasn’t initially designed with security in mind, early email platforms […]

Navigating IT-OT Convergence: A Strategic Imperative for Enterprise Success

Written by S Sreekumar, VP and Global Practice Head, Cybersecurity, HCLTech and José Grandmougin, Senior Director Consulting System Engineering GSI and OT, Fortinet.In the ever-evolving landscape of digital transformation, the convergence of Information Technology (IT) and Operational Technology (OT) emerges as a pivotal paradigm shift. Understanding the interconnected nature of these domains is not just […]

AI Deepfake Security Concerns

In light of the most revolutionary technology ever introduced, CSA’s SECtember.ai conference will feature three days of insightful sessions and active discussions about navigating the future of AI and cloud security. SECtember.ai will take place on September 10-12, 2024 at the Meydenbauer Center in Bellevue, WA.In preparation for this important event, members of the SECtember.ai […]

Building Security Around Human Vulnerabilities

Written by Benjamin Corll, CISO in Residence, Zscaler.Why are organizations spending money on cybersecurity solutions when studies show 88% of data breaches are caused by human mistakes? If you’re a cybersecurity leader you have probably heard some variation of this question from people skeptical of our industry. The implication is that it’s unwise to buy […]

EU AI Act Introduces Unique Tiered System for Risks

Originally published by Truyo.With the full text of the EU AI Act made public, Truyo President Dan Clarke read through the Act in its entirety to identify key elements that will be crucial to compliance for organizations in scope. The Act includes the conventional components of transparency, privacy, education, security, non-discrimination, and risk assessment.Where it […]

This site uses cookies to offer you a better browsing experience. By browsing this website, you agree to our use of cookies. Click More Info to view Privacy Policy.