Category Archives: Cloud Security Alliance

Category Added in a WPeMatico Campaign

Your complete SaaS security guide—with best practices for ensuring it

Originally published by Vanta.   SaaS security requires constantly monitoring and preparing to mitigate the latest industry threats and vulnerabilities. According to the 2024 State of SaaS Security Report, 58% of organizations experienced a SaaS security incident in the past year despite having high confidence levels in their existing security programs. ‍ Today, SaaS applications are […]

Cloud Security Alliance (CSA) Furthers Responsible Artificial Intelligence (AI) Safety Practices with Launch of Premier AI Safety Ambassador Program

Ambassador Program strengthens CSA’s mission to ensure AI safety and accountability SEATTLE – March 3, 2025 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment, is pleased to announce the inaugural cohort of Premier Artificial Intelligence (AI) Safety Ambassadors. […]

The HIPAA Security Rule is Changing. Here’s What You Need to Know.

Originally published by BARR Advisory.   The U.S. Department of Health and Human Services (HHS) Office for Civil Rights (OCR) is preparing to make sweeping changes to the Health Insurance Portability and Accountability Act (HIPAA) Security Rule. OCR published a proposal outlining major updates that could soon be coming to the HIPAA Security Rule. The potential changes […]

Building Better GRC Habits: Why 2025 Is the Year To Embrace Continuous Controls Monitoring

Originally published by RegScale.   Every January, we commit to building better habits. We buy gym memberships, download meditation apps, or swear to finally learn that new language. But here’s a thought: how well are our organizations carrying out their own New Year’s resolutions?  Looking at the state of GRC today, it’s clear that many […]

The ISAC Advantage for Collective Threat Intelligence

Originally published by Zscaler.   With cyberthreats rapidly increasing in sophistication, today’s CISOs cannot afford to stand alone. To outsmart some of the world’s most ingenious and nefarious criminals, we must pool our knowledge, blend our insights, and present a united front.  We have a clear and present need to collaborate across sectors, and information sharing […]

What is the DSA? And What Does It Mean for Cloud Providers?

Originally published by Thales.   Two hundred years ago, safety and child labor laws were monstrously lax compared to today’s standards. In two hundred years more, our ancestors will look back with similar disbelief on our regulation of digital services. However, it is also true that regulations reflect the societal principles and values of their […]

A Starter’s Guide to PCI 4.0 Compliance for Non-Human Identities

Originally published by Aembit.   For many of today’s hybrid and data-driven enterprises, non-human identities (NHIs) – often referred to as machine and service accounts – are emerging as one of the most overlooked risks.  While much attention has been devoted to securing human credentials, countless application-to-application connections and service accounts remain dependent on static and […]

Why Should Active Directory Hygiene Be Part of Your NHI Security Program?

Originally published by Oasis Security. Written by Roey Rozi, Director of Solution Architecture, Oasis Security.   Active Directory (AD) has been around forever—and for good reason. If you’ve got a big on-prem setup, it’s the go-to for managing users, permissions, and access. But here’s the catch: AD wasn’t built for today’s hybrid and machine-driven environments, where on-prem meets […]

Implementing CCM: The Change Management Process

The Cloud Controls Matrix (CCM) is a framework of controls (policies, procedures, and technical measures) that are essential for cloud computing security. It is created and updated by CSA and aligned to CSA best practices. You can use CCM to systematically assess and guide the security of any cloud implementation. CCM also provides guidance on […]

7 Cloud Security Mistakes You May Not Realize You’re Making

Originally published by Seiso. Written by Eric Lansbery.   With every new tool or layer of protection, complexity grows—along with risks. Many organizations unknowingly make common security mistakes, such as misconfigurations, reliance on manual processes, and fragmented team efforts, leaving their cloud environments vulnerable despite significant investments.   Why is Cloud Security is Becoming More Complex? […]

This site uses cookies to offer you a better browsing experience. By browsing this website, you agree to our use of cookies. Click More Info to view Privacy Policy.