Category Archives: Cloud Security Alliance

Category Added in a WPeMatico Campaign

New SEC Rules: Material Incident Reporting Through Cybersecurity Disclosures

Originally published by Cyera.Written by Jonathan Sharabi.The Securities and Exchange Commission (SEC) rules set forth on July 26th, 2023, require that nearly all companies that file documents with the SEC (“registrants”) must describe the processes and management procedures they use to assess, identify, and manage cybersecurity risks. The new regulations aim to provide investors and […]

A Risk-Based Approach to Vulnerability Management

Written by Devin Maguire, ArmorCode.Security and risk are related but not synonymous. Security prevents, detects, and responds to attacks and is a key variable in the broader category of risk management. Risk management weighs the probability and impact of adverse events across the organization to inform and influence decisions. The relationship between security and risk […]

Utah S.B. 149: Creating a Safe Space for Developers While Regulating Deceptive AI

Originally published by Truyo.Written by Dan Clarke.Utah’s foray into the realm of artificial intelligence (AI) regulation is marked by the passage of Senate Bill 149, the Artificial Intelligence Policy Act. While many states grapple with the complexities of AI governance, Utah’s rather fast and reactive approach emphasizes consumer protection and seeks to hold businesses accountable […]

Building Resilience Against Recurrence with Cloud Remediation

Originally published by Tamnoon.Written by Michael St.Onge, Principal Security Architect, Tamnoon.In the fast-evolving cloud security landscape, successful remediation isn’t just about fixing issues when they arise – it’s equally about preventing the recurrence of these issues.Prevention is the final, critical stage of the cloud security remediation process. After a specific threat or vulnerability has been […]

The Narrow Escape from the xz Disaster

Originally published by Dazz.Written by Tomer Schwartz, Co-founder & CTO, Dazz.In the intricate world of software supply chain, the recent near-miss incident with CVE-2024-3094–the xz/liblzma backdoor–serves as a potent reminder of our system’s fragility and the constant vigilance required to safeguard it. In short, a widely used open source package was compromised to add a […]

Enterprise Management Associates Names Cloud Security Alliance as a Cutting-Edge Security Exhibitor in Its Vendor Vision 2024 Report for RSA

CSA was the only nonprofit to be named in the reportSAN FRANCISCO (RSA Conference) – May 7, 2024 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment, is pleased to announce that it was selected as a leading […]

12 Strategic Career Tips for Aspiring CISOs

Originally published by Abnormal Security.Written by Mike Britton.In the ever-evolving world of cybersecurity, the role of Chief Information Security Officer (CISO) has been firmly established as a critical position. And while the journey to becoming a CISO can be challenging, the destination is undoubtedly rewarding—and certainly never dull.Whether you’re taking your first steps on the […]

CISOs, AI, and OT: A Balancing Act Between Innovation and Protection

Originally published by CXO REvolutionaries.Written by Ben Corll, CISO in Residence, Zscaler.In early 2024, I had the privilege of teaching a SANS leadership course in New Orleans. The food was amazing, as expected. What I didn’t expect was the sheer number of operational technology (OT) security professionals who would be in attendance. As I attended […]

Microsoft Copilot for Security: Everything You Need to Know

Originally published by Reco.Written by Gal Nakash.What is Microsoft Copilot for Security?‍Microsoft Copilot for Security is an innovative component of the Microsoft security product portfolio. It is essentially engineered to redefine the management of security incidents. This solution is deeply integrated with Microsoft 365, offering a sophisticated AI-powered platform to cybersecurity professionals. It simplifies the […]

Navigating the Cloud – Beyond “Best Practices”

Originally published by Cloud Computing Consultants.Cloud migrations are complex. Rapidly evolving technology, team culture changes, and changing architectural requirements leave companies seeking options to alleviate their cloud migration paths. As a result, businesses are bombarded with a slew of “best practices” and “reference architectures” purported to guide them toward the most efficient, secure, and cost-effective […]

This site uses cookies to offer you a better browsing experience. By browsing this website, you agree to our use of cookies. Click More Info to view Privacy Policy.