Originally published by CheckRed. Written by Amardip Deshpande, Senior Security Researcher, CheckRed. Cloud and SaaS identities are not just about people. They also include the digital personas of applications, services, and machines. These digital identities are crucial for managing access and ensuring security in modern cloud environments. Understanding Human Identities In the context of […]
Category Archives: Cloud Security Alliance
Category Added in a WPeMatico Campaign
Award-winning program named finalist for Best Professional Certification Program SEATTLE – April 9, 2025 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment, is proud to announce that its award-winning Certificate of Competence in Zero Trust (CCZT) has […]
Originally Published by Koat. Summary Disinformation’s Impact on Reputation and Finances: Disinformation can severely damage a company’s reputation, erode consumer trust, and lead to significant financial losses. False narratives, such as rumors about product defects or unethical practices, can undermine brand integrity and customer loyalty. Role of Threat Intelligence in Combatting Disinformation: Threat intelligence […]
Originally published by Schellman. Written by Tu Nguyen. If you’ve seen the news lately, you know that breaches stemming from third-party vendors are on the rise, and it seems no organization is truly safe. Whether you’re still actively contracted with a third party or have ceased providing services, recent incidents prove you’re still at risk, […]
Originally published by Valence. Written by Jason Siberman. The rise of SaaS applications has transformed the way organizations operate, enabling greater collaboration, agility, and efficiency. Business-critical tools such as Salesforce, HubSpot, Workday, NetSuite, and GitHub are essential for departments like sales, marketing, HR, finance, and R&D. These tools empower teams to work independently, adopt […]
Originally Published by Barr Advisory on February 7, 2025. New cybersecurity requirements are fast approaching for organizations that process payment card transactions. In 2022, the PCI Security Standards Council (SSC) introduced PCI DSS 4.0 (now 4.0.1), a major update to the framework that expanded the list of mandatory security controls and introduced greater flexibility for businesses […]
Written by Eleftherios Skoutaris. The landscape of cloud security compliance is constantly evolving, and the U.S. Federal Risk and Authorization Management Program (FedRAMP) is no exception. As highlighted recently, FedRAMP will be undergoing a significant transformation with the rollout of FedRAMP 20x, aiming to modernize and streamline the authorization process for Cloud Service Providers (CSPs) working […]
Written by John Kindervag, Chief Evangelist, Illumio. Artificial intelligence is cybersecurity’s newest obsession. With every advancement — like China’s recent DeepSeek AI announcement — comes fresh waves of alarm about AI-driven cyberattacks and the inevitable doom they’ll bring. I understand the concern. The idea of AI-powered threats evolving faster than our defenses is unsettling. […]
Originally published by Truyo. Written by Dan Clarke. Artificial intelligence (AI) offers tremendous opportunities for innovation, efficiency, and growth across various industries. However, as AI systems become increasingly integrated into business operations, the need for thorough and ongoing assessments becomes crucial. These assessments help organizations mitigate risks, ensure compliance, and build trust among […]
Originally Published by Abnormal Security. Written by Emily Burns. Phishing attacks continue to be one of the most effective cyber threats, leveraging deception and social engineering to manipulate individuals and organizations. In fact, phishing accounts for 15% of all data breaches, with an average cost of $4.88 million, according to IBM’s 2024 Cost of a Data […]