Category Archives: Cloud Security Alliance

Category Added in a WPeMatico Campaign

Risk Management in the Age of Artificial Intelligence: 9 Questions to Ask Your AI-Powered Vendors

Originally published by BARR Advisory.Artificial intelligence (AI) presents organizations across industries with the opportunity to streamline their workflows, better secure their systems, and solve some of the world’s most pressing issues. But while AI has the potential to offer huge benefits to businesses, it doesn’t come without risk.“AI can be a useful tool, but business […]

AWS S3 Bucket Security: The Top CSPM Practices

Written by ArmorCode.An S3 bucket is a fundamental resource in Amazon Web Services (AWS) for storing and managing data in the cloud. S3 stands for “Simple Storage Service,” providing scalable, durable, and highly available object storage.S3 is widely used for various purposes, such as storing backups, hosting static websites, serving as a data lake for […]

Security Considerations for Hardware Security Module as a Service

A hardware security module (HSM) is a trusted platform for performing cryptographic operations and protecting keys. A main feature of the HSM architecture is its special co-processor that performs cryptography functions. HSMs also consist of a hardware-based random number generator, RAM, storage, and external interface. HSM-as-a-Service is a growing market, with many organizations using it […]

Cloud Security Alliance Announces Implementation Guidelines v2.0 for Cloud Controls Matrix (CCM) in Alignment with Shared Security Responsibility Model

Update strengthens CCM’s position as the cloud security industry’s preferred control frameworkSEATTLE – June 4, 2024 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment, has issued Cloud Controls Matrix (CCM) Implementation Guidelines v2.0: Securing the Cloud with […]

Cloud Security Alliance Survey Finds 70% of Organizations Have Established Dedicated SaaS Security Teams

Despite economic uncertainty, organizations are prioritizing SaaS security investmentGartner Security and Risk Management Summit, National Harbor, Maryland – June 4, 2024 – Seventy percent of organizations have prioritized investment in SaaS security, establishing dedicated SaaS security teams, despite economic uncertainty and workforce reductions. This was a key finding in the fourth Annual SaaS Security Survey […]

The Path to SOC 2 Compliance for Startups

I’ve worked for some notable early-stage startup companies that sought to do business with Fortune 500 companies. I clearly remember the challenges of demonstrating how you can protect their customer data. SOC 2 compliance for startups can be a massive undertaking.When you have a compelling solution, as many of CSA’s Startup Members do, you often […]

Unlocking Trust in the Digital Age: The Power of Blockchain Technologies

Written by Gökhan Polat, Member of the CSA Blockchain Working Group.Trust serves as the cornerstone of strong human relationships, fostering security, effective communication, cooperation, and emotional intimacy. In today’s business landscape, trust is paramount, especially in the digital realm where digital trust plays a vital role. It encompasses security, privacy, dependability, and ethical considerations, acting […]

Mastering Secure DevOps with Six Key Strategies

Written by the CSA DevSecOps Working Group.Cloud computing has heightened security challenges, with frequent breaches stemming from insecure applications and poor infrastructure. Similarly, as software development speeds up, the complexity and number of attacks and data breaches also rise.Secure DevOps (or DevSecOps) addresses these challenges by embedding security into the development and operational processes. Secure […]

2024 Report Reveals Hundreds of Security Events Per Week, Highlighting the Criticality of Continuous Validation

Originally published by Pentera.Over the past two years, a shocking 51% of organizations surveyed in a leading industry report have been compromised by a cyberattack. Yes, over half. And this, in a world where enterprises deploy an average of 53 different security solutions to safeguard their digital domain. Alarming? Absolutely.A recent survey of CISOs and […]

This site uses cookies to offer you a better browsing experience. By browsing this website, you agree to our use of cookies. Click More Info to view Privacy Policy.