Originally published by Vali Cyber. Industry 4.0 transforming manufacturing, making operations smarter, faster, and more efficient. But with increased connectivity comes increased risk. Hypervisor threats are evolving fast—especially for organizations relying on VMware ESXi to power their virtualized environments. Many companies invest heavily in endpoint and network protection, yet overlook one of their most […]
Category Archives: Cloud Security Alliance
Category Added in a WPeMatico Campaign
Originally published by Koat. Summary Ethical AI Importance: Ethical AI is crucial for businesses to ensure fair, transparent, and accountable use of AI technologies, fostering trust and maintaining reputations. AI Benefits and Risks: AI offers opportunities for businesses to enhance efficiency, improve decision-making, and offer innovative solutions, but also brings significant ethical challenges. Transparency in AI: Invest in […]
Originally Published by Abnormal AI. Written by Richard Orange. We hired an ethical hacker to stage real-time social engineering attacks with AI powering the engine. The results confirm that it’s a golden age for scammers… and show you exactly where to put your cyber security budget in 2025. Anyone who has worked at a major […]
Originally published by CXO REvolutionaries. Written by Jay Patty, CTO in Residence, Zscaler. Know the difference between vendor-related and technology-related problems to determine the fastest resolution. Thomas Jefferson famously proclaimed that all men are created equal, but he would agree that today’s technical problems are not. Some are tied to the quirks of a […]
CAR to solve real-world compliance problems with practical and effective solutions SAN FRANCISCO (RSA Conference) and SEATTLE – April 29, 2025 – Today’s organizations have to comply with hundreds of data security and privacy laws, while grappling with an influx of even more regulations thanks to the rise of Artificial Intelligence (AI). Making matters more […]
Originally published by Scrut Automation. Written by Nicholas Muy. The evolving role of GDPR Auditors As businesses continue to rely more on data, the need for strong privacy and compliance measures has never been greater. The General Data Protection Regulation (GDPR) safeguards personal data, but staying compliant is an ongoing challenge amid evolving regulations […]
Written by Anna Campbell Schorr, Training Program Director, Cloud Security Alliance. Over the years, we’ve witnessed security paradigms evolve—from the early days of perimeter defense, to the rise of Zero Trust, and most recently, the challenges introduced by Artificial Intelligence (AI). AI is rapidly becoming a cornerstone of the enterprise landscape: according to The […]
The Cloud Controls Matrix (CCM) is a framework of controls that are essential for cloud computing security. It is created and updated by CSA and aligned to CSA best practices. You can use CCM to systematically assess and guide the security of any cloud implementation. CCM also provides guidance on which actors within the cloud […]
Originally published by Schellman. Written by Austin Bentley. It’s no secret: many organizations view and treat phishing as a periodic checkbox assessment. It’s often a basic email template sent to an entire organization. If someone clicks the link, they are recorded and possibly enrolled in training. While this approach can certainly check the “quarterly […]
The Cloud Controls Matrix (CCM) is a framework of essential cloud security controls that follow CSA best practices. You can use CCM to assess and guide the security of any cloud implementation. CCM also provides guidance on which actors within the cloud supply chain should implement which security controls. Both cloud service customers (CSCs) and […]