Category Archives: Cloud Security Alliance

Category Added in a WPeMatico Campaign

What to Expect When Starting Out With Microsegmentation

Originally published by Illumio.Written by Christer Swartz, Solutions Marketing Director, Illumio.According to Gartner, “By 2026, 60% of enterprises working toward zero trust architecture will use more than one deployment form of microsegmentation, which is up from less than 5% in 2023.” Microsegmentation is foundational to zero trust. You can’t achieve zero trust without it. In […]

Understanding Domain Generation Algorithms (DGAs)

Originally published by Zscaler.Domain generation algorithms (DGAs) are an at least semi-sophisticated technique used by malware authors and distributors to ensure the resilience and adaptability of their malicious infrastructure. DGAs dynamically generate multiple domain names that act as rendezvous points between malware and their command and control (C2) servers. Here we’ll dive into what DGAs […]

What is Third-Party Risk Management and Why Does It Matter?

Originally published by Schellman.Written by Sara Mylin.As threats continue to evolve and grow more creative and sophisticated, cybersecurity remains a paramount concern of organizations everywhere. But these days, it’s not enough to implement the necessary data to protect the data in your systems—more and more, bad actors are targeting third-party providers as a backdoor into […]

Cloud Security Alliance Issues Series of Tools to Assist Organizations in Mitigating Cybersecurity Risks Associated with Distributed Ledger Technology

Documents provide critical resources for creating a more secure environment for all shared network participantsSEATTLE – Jan. 23, 2025 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment, today released the Distributed Ledger Technology (DLT) Cybersecurity Governance […]

SOC Expert Perspectives: 5 Key Social Engineering Threats

Originally published by Abnormal Security.Written by Mick Leach.Social engineering attacks are an escalating threat to modern organizations, with data breaches caused by these tactics taking an average of 257 days to contain, as revealed in IBM’s 2024 Cost of a Data Breach Report. Additionally, social engineering was used in 30% of breaches in 2023 alone, […]

Solving the Cyber Workforce Puzzle

Originally published by CXO REvolutionaries.Zscaler EVP, Customer Experience & Transformation Kavitha Mariappan recounts her conversation with CISA Director Jen Easterly and Girls Who Code CEO Dr. Tarika Barrett.Ernő Rubik said “If you are curious, you will find the puzzles around you and, if you are determined, you will solve them.” CISA Director Jen Easterly used […]

Cloud Security Alliance and Whistic Partner to Advance Secure and Responsible Development of Artificial Intelligence (AI) Technologies

Organizations collaborate on mutual goal of evaluating risks and defining controls related to Generative Artificial IntelligenceSEATTLE – Jan. 20, 2025 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment, and Whistic, the leading AI-first modern platform for […]

Unlocking the Power of AI: An Intro to Prompt Engineering

Artificial Intelligence (AI) has become a cornerstone of innovation, transforming industries and reshaping how we interact with technology. At the heart of this revolution lies Large Language Models (LLMs)—AI systems designed to understand and generate human-like text.However, even the most advanced AI needs direction from a human to perform effectively. Enter prompt engineering, the art […]

The EU AI Act: A New Era of AI Governance Began August 1st

Originally published by Truyo.Written by Dan Clarke.The European Union’s AI Act, which entered into force August 1, 2024, marks a historic milestone as the world’s first comprehensive regulation for artificial intelligence. This groundbreaking legislation, initially agreed upon in December 2023, aims to establish a robust framework for AI development and deployment, ensuring that technology advancements […]

Secrets & Non-Human Identity Security in Hybrid Cloud Infrastructure: Strategies for Success

Written by Itzik Alvas, Entro.Secrets & Non-Human Identities (NHIs) security in hybrid cloud environments is a critical challenge in today’s IT landscape. Passwords, API keys, certificates, and tokens are not just digital assets; they are the lifeblood of your organization’s security. Protecting these non-human identities is essential for maintaining the integrity of your infrastructure. This […]