Category Archives: Cloud Security Alliance

Category Added in a WPeMatico Campaign

Human and Non-Human Identities: The Overlooked Security Risk in Modern Enterprises

Originally published by CheckRed.  Written by Amardip Deshpande, Senior Security Researcher, CheckRed.   Cloud and SaaS identities are not just about people. They also include the digital personas of applications, services, and machines. These digital identities are crucial for managing access and ensuring security in modern cloud environments.   Understanding Human Identities In the context of […]

Cloud Security Alliance’s Certificate of Competence in Zero Trust (CCZT) Selected as 2025 SC Awards Finalist

Award-winning program named finalist for Best Professional Certification Program SEATTLE – April 9, 2025 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment, is proud to announce that its award-winning Certificate of Competence in Zero Trust (CCZT) has […]

The Disinformation Epidemic and Its Cost to Modern Enterprises

Originally Published by Koat.   Summary Disinformation’s Impact on Reputation and Finances: Disinformation can severely damage a company’s reputation, erode consumer trust, and lead to significant financial losses. False narratives, such as rumors about product defects or unethical practices, can undermine brand integrity and customer loyalty. Role of Threat Intelligence in Combatting Disinformation: Threat intelligence […]

How to Enhance Your TPRM Through Staff Augmentation

Originally published by Schellman. Written by Tu Nguyen.   If you’ve seen the news lately, you know that breaches stemming from third-party vendors are on the rise, and it seems no organization is truly safe. Whether you’re still actively contracted with a third party or have ceased providing services, recent incidents prove you’re still at risk, […]

The Challenge of Distributed SaaS Management—Balancing Productivity and Security

Originally published by Valence. Written by Jason Siberman.   The rise of SaaS applications has transformed the way organizations operate, enabling greater collaboration, agility, and efficiency. Business-critical tools such as Salesforce, HubSpot, Workday, NetSuite, and GitHub are essential for departments like sales, marketing, HR, finance, and R&D. These tools empower teams to work independently, adopt […]

PCI DSS Future-Dated Controls: 7 Critical Changes that Will Shape Your Security Strategy

Originally Published by Barr Advisory on February 7, 2025.   New cybersecurity requirements are fast approaching for organizations that process payment card transactions. In 2022, the PCI Security Standards Council (SSC) introduced PCI DSS 4.0 (now 4.0.1), a major update to the framework that expanded the list of mandatory security controls and introduced greater flexibility for businesses […]

Navigating the FedRAMP Evolution: How CSA CCM Provides a Solid Foundation

Written by Eleftherios Skoutaris.   The landscape of cloud security compliance is constantly evolving, and the U.S. Federal Risk and Authorization Management Program (FedRAMP) is no exception. As highlighted recently, FedRAMP will be undergoing a significant transformation with the rollout of FedRAMP 20x, aiming to modernize and streamline the authorization process for Cloud Service Providers (CSPs) working […]

Why AI Isn’t Keeping Me Up at Night

Written by John Kindervag, Chief Evangelist, Illumio.   Artificial intelligence is cybersecurity’s newest obsession. With every advancement — like China’s recent DeepSeek AI announcement — comes fresh waves of alarm about AI-driven cyberattacks and the inevitable doom they’ll bring. I understand the concern. The idea of AI-powered threats evolving faster than our defenses is unsettling. […]

Ensuring Responsible AI: A Comprehensive Approach to AI Assessments

Originally published by Truyo.   Written by Dan Clarke.   Artificial intelligence (AI) offers tremendous opportunities for innovation, efficiency, and growth across various industries. However, as AI systems become increasingly integrated into business operations, the need for thorough and ongoing assessments becomes crucial. These assessments help organizations mitigate risks, ensure compliance, and build trust among […]

The Most Common Types of Phishing Attacks and Their Impact

Originally Published by Abnormal Security.   Written by Emily Burns.   Phishing attacks continue to be one of the most effective cyber threats, leveraging deception and social engineering to manipulate individuals and organizations. In fact, phishing accounts for 15% of all data breaches, with an average cost of $4.88 million, according to IBM’s 2024 Cost of a Data […]

This site uses cookies to offer you a better browsing experience. By browsing this website, you agree to our use of cookies. Click More Info to view Privacy Policy.