Originally published by Illumio.Written by Christer Swartz, Solutions Marketing Director, Illumio.According to Gartner, “By 2026, 60% of enterprises working toward zero trust architecture will use more than one deployment form of microsegmentation, which is up from less than 5% in 2023.” Microsegmentation is foundational to zero trust. You can’t achieve zero trust without it. In […]
Category Archives: Cloud Security Alliance
Category Added in a WPeMatico Campaign
Originally published by Zscaler.Domain generation algorithms (DGAs) are an at least semi-sophisticated technique used by malware authors and distributors to ensure the resilience and adaptability of their malicious infrastructure. DGAs dynamically generate multiple domain names that act as rendezvous points between malware and their command and control (C2) servers. Here we’ll dive into what DGAs […]
Originally published by Schellman.Written by Sara Mylin.As threats continue to evolve and grow more creative and sophisticated, cybersecurity remains a paramount concern of organizations everywhere. But these days, it’s not enough to implement the necessary data to protect the data in your systems—more and more, bad actors are targeting third-party providers as a backdoor into […]
Documents provide critical resources for creating a more secure environment for all shared network participantsSEATTLE – Jan. 23, 2025 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment, today released the Distributed Ledger Technology (DLT) Cybersecurity Governance […]
Originally published by Abnormal Security.Written by Mick Leach.Social engineering attacks are an escalating threat to modern organizations, with data breaches caused by these tactics taking an average of 257 days to contain, as revealed in IBM’s 2024 Cost of a Data Breach Report. Additionally, social engineering was used in 30% of breaches in 2023 alone, […]
Originally published by CXO REvolutionaries.Zscaler EVP, Customer Experience & Transformation Kavitha Mariappan recounts her conversation with CISA Director Jen Easterly and Girls Who Code CEO Dr. Tarika Barrett.Ernő Rubik said “If you are curious, you will find the puzzles around you and, if you are determined, you will solve them.” CISA Director Jen Easterly used […]
Organizations collaborate on mutual goal of evaluating risks and defining controls related to Generative Artificial IntelligenceSEATTLE – Jan. 20, 2025 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment, and Whistic, the leading AI-first modern platform for […]
Artificial Intelligence (AI) has become a cornerstone of innovation, transforming industries and reshaping how we interact with technology. At the heart of this revolution lies Large Language Models (LLMs)—AI systems designed to understand and generate human-like text.However, even the most advanced AI needs direction from a human to perform effectively. Enter prompt engineering, the art […]
Originally published by Truyo.Written by Dan Clarke.The European Union’s AI Act, which entered into force August 1, 2024, marks a historic milestone as the world’s first comprehensive regulation for artificial intelligence. This groundbreaking legislation, initially agreed upon in December 2023, aims to establish a robust framework for AI development and deployment, ensuring that technology advancements […]
Written by Itzik Alvas, Entro.Secrets & Non-Human Identities (NHIs) security in hybrid cloud environments is a critical challenge in today’s IT landscape. Passwords, API keys, certificates, and tokens are not just digital assets; they are the lifeblood of your organization’s security. Protecting these non-human identities is essential for maintaining the integrity of your infrastructure. This […]