Category Archives: Cloud Security Alliance

Category Added in a WPeMatico Campaign

Why Compliance is a Roadmap to Security

Originally published by RegScale.In the realm of cybersecurity, compliance is often perceived as a necessary but sometimes challenging aspect of safeguarding data and systems. As we celebrate Cybersecurity Awareness Month, let’s delve into the evolving role of compliance in the cybersecurity landscape.Compliance: A Roadmap to SecurityCompliance doesn’t make you secure. Compliance gives you the questions […]

A New Era of Data Protection: CSA’s Strategic Partnership with the EU Cloud CoC for GDPR Compliance

Read the full FAQ here.In an era where data protection has become a vital concern for cloud service providers (CSPs) and their clients, the Cloud Security Alliance (CSA) has partnered with the EU Cloud Code of Conduct (EU Cloud CoC) to disseminate privacy standards across the cloud sector. This initiative offers a seamless GDPR compliance […]

To Meet Bold Ambitions and Combat Mounting Threats, Australia Endorses Zero Trust

Originally published by CXO REvolutionaries.Written by Heng Mok, CISO in Residence, Zscaler. If Australia is to become the most cyber-secure nation in the world by 2030, as Cyber Security Minister Clare O’Neill has said it can be, it has a ways to go. The Australian government’s recognition of this fact can be seen in two […]

An Explanation of the Guidelines for Secure AI System Development

Originally published by Schellman & Co.Recently, the UK National Security Centre (NCSC) and the US Cybersecurity and Infrastructure Security Agency (CISA)—along with other groups from around the world—released the Guidelines for Secure AI System Development. A new resource for developers as of November 2023, the document is meant to aid in the development of secure […]

What is Azure Policy: All You Need to Know

Originally published by Sonrai Security.Written by Tally Shea. What is Azure Policy? Azure Policy is a service within Microsoft Azure that allows organizations to create, assign, and manage policies. These policies define rules and effects over resources, identities, and groups, in an effort to ensure compliance and uphold security. Enforcement comes in two forms – […]

Latest DevSecOps Guidance from Cloud Security Alliance and SAFECode Emphasizes Value of Collaboration, Integration in DevSecOps Landscape

Document provides practical insights for seamlessly embedding security in DevOps processes and workflow and examines convergence of DevSecOps with Zero Trust, MLSecOps, and AIOps SEATTLE – Feb. 21, 2024 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment, […]

Trust Model: The First Step to Ensure Your IT Network

Originally published by Devoteam.What is Zero Trust? Zero Trust is a security approach that mandates verification, employs least privilege, and operates under the assumption of a breach for every access request to a private network, irrespective of its origin or destination. Its foundation rests on several principles to improve your security: Explicit Verification: All access […]

AI in the SOC: Enhancing Efficiency Without Replacing Human Expertise

Originally published by Abnormal Security. Written by Mick Leach.The quickened pace of AI development and release of tools like ChatGPT mark a fundamental shift in the AI conversation—moving from “what could happen” to “what will happen.”One topic that gets a significant amount of attention is whetherAI will start replacing humans in so-called “knowledge worker” jobs—those […]

Data Governance in the Cloud

Written by Ashwin Chaudhary, CEO, Accedere. As all organizations are moving towards the digitization of data and cloud computing, it is important to protect and ensure data governance by all organizations. New data security solutions are needed considering data digitization and cloud computing. According to Gartner, “By 2025, 80% of organizations seeking to scale digital […]

Zero Trust Messaging Needs a Reboot

Written by Daniel Ballmer, Senior Transformation Analyst, CXO REvolutionaries, Zscaler.It’s 2024, and Zero Trust adoption across industries remains somewhere below 33%. For reference, de-perimeterization, a stepping-stone to Zero Trust, was first discussed on the Jericho Forums twenty years ago. By 2010, the term Zero Trust was a staple of cybersecurity conversations. Now, public and private […]

This site uses cookies to offer you a better browsing experience. By browsing this website, you agree to our use of cookies. Click More Info to view Privacy Policy.