Category Archives: Cloud Security Alliance

Category Added in a WPeMatico Campaign

From gatekeeper to guardian: Why CISOs must embrace their inner business superhero

Originally published by Zscaler.(And why it should become our outer superhero persona, too)Let’s face it. The days of the CISO as the lone wolf, guarding the castle walls with a stack of firewalls and a suspicious glare, are over (though some of us still have an icy glare). Today’s cybersecurity landscape demands a different kind […]

Cantwell Proposes Legislation to Create a Blueprint for AI Innovation and Security

Originally published by Truyo.In 2024, a surge of global AI legislation is imminent, with the United States poised to follow the European Union’s lead by implementing comprehensive nationwide rules and guidelines. Senate Commerce Committee Chair Maria Cantwell is gearing up to unleash a wave of groundbreaking AI legislation, marking the first comprehensive initiative in Congress […]

Sealing Pandora’s Box – The Urgent Need for Responsible AI Governance

Written by MJ Schwenger, AI Working Group.The explosive emergence of Generative AI, with its ability to create seemingly magical outputs from text to code, is undeniably exciting. However, lurking beneath this shiny surface lies a Pandora’s box of potential risks that demand immediate attention and effective governance. Left unchecked, these risks could not only compromise […]

Remote Code Execution (RCE) Lateral Movement Tactics in Cloud Exploitation

Originally published by Uptycs.When it comes to cybersecurity, Remote Code Execution (RCE) might sound complex, but in essence, it’s a straightforward concept with profound implications. Among the myriad of security vulnerabilities, RCEs are particularly alarming due to their high impact and the severe damage they can cause. A prime example of such a vulnerability is […]

Powerful Cloud Permissions You Should Know: Part 2

Originally published by Sonrai Security.Written by Tally Shea and Deirdre Hennigar.MITRE ATT&CK Framework: PersistenceThis blog is the second publication in a series exploring the most powerful cloud permissions and how they map to the MITRE ATT&CK Framework. If you have not yet read the first blog on the Initial Access stage, you can find it […]

Navigating Your Cloud Journey in 2024: Key Resources from the Cloud Security Alliance

Written by Nicole Krenz, Web Marketing Specialist, CSA.The cloud security landscape is ever-evolving, presenting new opportunities and challenges, especially in the realms of AI, compliance and governance, and continuous security education and advancement. The Cloud Security Alliance (CSA) is at the forefront of providing resources and initiatives to navigate these complexities. Here’s how CSA can […]

The Modern Data Stack Has Changed the Security Landscape

Written by Uday Srinivasan, CTO, Acante.The way businesses analyze, transform and share data has radically changed over the past few years. We are in the post-Hadoop era with the Apache Software Foundation retiring over 10 Hadoop-related projects over the last three years. The shift of enterprise data to the cloud, demands of rapid online analysis, […]

Detecting Compromised Accounts in Microsoft 365

Originally published by InsiderSecurity.IntroductionIn today’s digital age, cybersecurity is of paramount importance, with organizations facing an ever-evolving landscape of cyber threats and attacks. InsiderLab (our dedicated team of cybersecurity experts) conducts in-depth research and analysis of historical and emergent cyber threats, empowering organizations with the foresight needed to proactively safeguard their digital landscapes. Amid recent […]

Designed to Deceive: 6 Common Look-alike Domain Tactics

Originally published by Abnormal Security.Written by Mick Leach.With threat actors lurking around every digital corner, it can sometimes make scrolling through an inbox feel like traversing a minefield. Employing various strategies to deceive their targets, attackers count on end-user oversight to convince the recipients of their malicious emails that the messages (and any included requests) […]

Privacy Isn’t Just About Data: It’s About Dignity

Written by Dr. Chantal Spleiss, CSA AI Governance and Compliance Working Group Co-Chair.The consequences of a privacy breach extend far beyond data loss, potentially triggering deep feelings of shame. Less than 15% of countries do not have or are drafting a privacy law emphasizing the huge importance of privacy. These could be the consequences for […]

This site uses cookies to offer you a better browsing experience. By browsing this website, you agree to our use of cookies. Click More Info to view Privacy Policy.