Category Archives: Cloud Security Alliance

Category Added in a WPeMatico Campaign

Tackling Ransomware Head-On: A Business’s Guide to Understanding and Defense

Originally published by Richey May.In today’s cybersecurity landscape, threats are more than just a cautionary tale—they’re a daily reality, and ransomware tops the list of concerns. This aggressive form of cyberattack can grind operations to a halt and compromise sensitive data. Keep reading, we’ll unpack how ransomware works, break down its mechanics and highlight how […]

According to Cloud Security Alliance Survey More than Half of Organizations Cite Technical Debt as Top Hurdle to Identity System Modernization

Report also found that over 75% of enterprises are using two or more IDPs and struggle to manage access controls and consistent security policiesSEATTLE – Oct. 30, 2024 – Modernizing identity systems is proving difficult for organizations due to two key challenges: decades of accumulated Identity and Access Management (IAM) technical debt and the complexity […]

Streamlining Cloud Security: Integrating CSA CCM Controls into Your ISO/IEC 27001 Framework

In today’s rapidly evolving security landscape, it can be overwhelming to manage multiple frameworks, especially for organizations striving for excellence in cloud security. The CSA Cloud Controls Matrix (CCM) is a gold standard in cloud security governance, providing a detailed map of best practices. However, if you already have an ISO/IEC 27001 Information Security Management […]

New Paper from Cloud Security Alliance Examines Considerations and Application of Zero Trust Principles for Critical Infrastructure

Paper bridges gap between traditional information technology security methodologies and the unique demands of critical infrastructure sectorsSEATTLE – Oct. 29, 2024 – In today’s interconnected world, critical infrastructure (CI) sectors face an ever-evolving landscape of cyber and physical threats. As these sectors embrace digital transformation and the convergence of operational technology (OT) and information technology […]

How CSA Research Uses the Cloud Controls Matrix to Address Diverse Security Challenges

CSA extensively leverages the Cloud Controls Matrix (CCM) to enhance security practices across various domains of cloud research. The CCM is a comprehensive cloud security framework consisting of 197 security control objectives. The main purpose of the framework is to help organizations address the unique challenges of cloud computing. However, the CCM also acts as […]

Elevating Alert Readiness: A People-First Approach for CISOs

Originally published by Devoteam.The Gartner Security & Risk Management Summit 2024 hammered home the need for a proactive and resilient approach to cybersecurity. Sure, there were plenty of shiny new technologies and strategies on display, but the biggest takeaway for me was the resounding emphasis on a people-centric approach to security and cyber resilience. This […]

Shadow AI Prevention: Safeguarding Your Organization’s AI Landscape

Written by CSA’s AI Organizational Responsibility Working Group.In today’s rapidly evolving technological landscape, the rise of Shadow AI poses a significant challenge to organizations. Shadow AI refers to unauthorized or undocumented AI systems within an organization, which can compromise security, compliance, and overall control of AI operations. Drawing from CSA’s recent AI Organizational Responsibilities publication, […]

Cloud Security Alliance Releases Second Paper Delineating Organizational Responsibilities for Successfully and Ethically Implementing Artificial Intelligence

Paper provides comprehensive, industry-neutral guidelines and best practices for various stakeholders, from CISOs and AI developers to business leaders and policymakersSEATTLE – Oct. 22, 2024 – Driven by the need to address the evolving landscape of Artificial Intelligence (AI) and its associated risks and ethical considerations, the Cloud Security Alliance (CSA), the world’s leading organization […]

Learn How to Conduct a Cybersecurity Audit for the Cloud with These CSA Training Options

As cloud adoption continues to reshape the IT landscape, ensuring cloud environments are secure and compliant is critical. However, a cybersecurity audit specific to cloud computing introduces unique challenges, given the complexities of shared security responsibilities between cloud providers and customers. Fortunately, CSA offers training and certificate programs designed to enhance auditors’ abilities to assess […]

Emulating Cryptomining Attacks: A Deep Dive into Resource Draining with GPU Programming

Originally published by Pentera.Cryptomining has surged in popularity, driven by the growing value of cryptocurrencies like Bitcoin and Ethereum. With leaked credentials easier than ever to acquire, attackers are looking for ways to profit, which has led to a rise in malicious cryptomining, or cryptojacking. This is where attackers hijack computer resources to mine cryptocurrency […]