Category Archives: Cloud Security Alliance

Category Added in a WPeMatico Campaign

NISTIR 8547: From PQC Standards to Real-World Implementations

How and when you should switch to post-quantum Written by Cory Missimore of the CSA Quantum-Safe Security Working Group. Reviewed by Bruno Huttner, Mehak Kalsi, and Mahesh Adulla.   NIST is helping companies and governments prepare for PQC As quantum computing technology continues to advance, so does the urgency for organizations to rethink their approach to cybersecurity. Many […]

Understanding Offensive AI vs. Defensive AI in Cybersecurity

Originally published by Abnormal Security.   Since the public release of ChatGPT two years ago, the field of artificial intelligence has grown tremendously in both good ways and bad. There’s no denying that the rapid evolution of AI has brought transformative benefits to numerous fields, including cybersecurity. But it has also introduced new challenges as […]

Assessing the Security of FHE Solutions

Written by Joseph Wilson and the CSA FHE Working Group.   Questions of privacy and security are at the forefront of every deployment of Fully Homomorphic Encryption (FHE). In this blog post, we provide insight that will help you to evaluate FHE solutions when answering the following questions: Is this solution secure? Who says so, […]

Gaining the Edge (Literally!) Through Edge Computing

Written by Neelakantan Venkataraman, Vice President & Global Head of Cloud & Edge Business, Tata Communications. Originally published by Frontier Enterprise.   The world is captivated by AI’s impressive deployment, but the real profits lie in reassessing operational models. As Singapore’s Minister for Digital Development and Information, Josephine Teo, noted, an internationally agreed-upon framework for AI governance […]

From Risk to Revenue with Zero Trust AI

Written by Richard Beck, Director of Cyber Security, QA Ltd.   AI security governance is fast becoming the boardroom’s new obsession, and with good reason. From biased models and hallucinated outputs to intellectual property leakage and regulatory scrutiny, the risks of unchecked AI are multiplying by the day. The challenge ahead of us is how we […]

3 Time-Consuming Security Functions to Automate in 2025

Originally published by Vanta.   Our most recent State of Trust report found that 55 percent of global businesses think security risks for their organization have never been higher. Naturally, to mitigate an increase in risks in today’s complex threat landscape, businesses invest time and money in building a robust cybersecurity posture.  But many security initiatives take […]

How to Address Cloud Identity Governance Blind Spots

Written by Gerry Gebel, VP of Products and Standards, Strata.   Working directly with organizations that are navigating the complexities of multi-cloud environments, one thing has become clear: managing identities across cloud and on-prem systems isn’t getting any easier. Whether it’s ensuring governance, improving visibility, or building resilience, many companies still struggle to get a firm […]

Top Threat #11 – APT Anxiety: Battling the Silent Threats

Written by CSA’s Top Threats Working Group.   In this blog series, we cover the key security challenges from CSA’s Top Threats to Cloud Computing 2024. Drawing from the insights of over 500 experts, we discuss the 11 top cybersecurity threats, their business impact, and how to tackle them. Whether you’re a professional or a […]

AI Security and Governance

Originally written by Hyland Security.   Artificial Intelligence (AI) has become an integral part of our daily lives and business operations, permeating various industries with its advanced capabilities. However, the rapid adoption of AI technologies also brings significant risks and challenges, necessitating robust AI security and governance that AI systems operate transparently, ethically, and within […]

The Hidden Costs of Manual GRC in a Cloud-First World

Originally published by RegScale.   Before I joined RegScale, I was a big buyer of legacy GRC tools. I won’t name any particular tools, but most of them featured 20-year-old approaches and “automation” in name only. At the end of the day, they left teams heavily reliant on manual processes disguised as digital solutions, with […]

This site uses cookies to offer you a better browsing experience. By browsing this website, you agree to our use of cookies. Click More Info to view Privacy Policy.