Category Archives: Cloud Security Alliance

Category Added in a WPeMatico Campaign

Cloud Security Alliance Examines Transformative Impact of Artificial Intelligence (AI) on Medical Research in Latest Report

Paper critically explores AI’s applications and challenges across several domains of healthcareSEATTLE – Sept. 26, 2024 – The convergence of medical advancements and breakthroughs in artificial intelligence (AI) has ushered in a new era of immense potential for healthcare delivery and research, according to a new report from the Cloud Security Alliance (CSA), the world’s […]

What are the Benefits of a Social Engineering Campaign?

Originally published by Schellman.For as long as the concept of cybersecurity has been around, much of the focus has centered on sophisticated technical controls—firewalls, password strength, network segmentation, endpoint protection, encryption, etc. And while implementation and regular testing of all these measures does better safeguard your organization, you also need to secure your people. In […]

AI Regulation in the United States: CA’s ADMT vs American Data Privacy and Protection Act

Originally published by Truyo.In the evolving landscape of artificial intelligence (AI) regulation, the United States finds itself at a crossroads, with two significant pieces of legislation vying to shape the future of AI governance: the California Automated Decisionmaking Technology law and the American Data Privacy and Protection Act (ADPPA).While the ADPPA isn’t strictly aimed at […]

8 Ways to Reduce Data Storage Costs

Originally published by Normalyze.Written by Vamsi Koduru.Many organizations don’t store their data. They hoard data.Too often, organizational data accumulates in a never-ending cycle of unnecessary duplication and hoarding. As a result, they suffer ever-growing data storage fees and significant risks to data security and compliance.Data grows for as many reasons as there are uses for […]

Is Your Production Data Secure? That’s a Hard NO.

Originally published by Paperclip.Written by Mike Bridges.The culture of cybersecurity and data protection is broken. Let’s look at it from a unique point of view. You’ve got an employee who is terrible at their job, consistently makes mistakes, and puts the company in harm’s way. Even worse, when you confront them about it, they make […]

Continuous Compliance Monitoring: A Must-Have Strategy

Originally published by BARR Advisory. Written by Cody Hewell and Brett Davis. A report by Proofpoint indicated that nearly 70% of CISOs feel their organization is at risk of experiencing a material cyber attack in the next 12 months. While annual assessments and audits will help your organization demonstrate your commitment to cybersecurity best practices, […]

The Cloud Security Layer Cake: Modern Use Cases for PAM

Originally published by CyberArk.Written by Sam Flaster.Warm. Rich. Chocolatey. The way I see it, a proper chocolate layer cake is the best sensory experience a human can have. Let’s go a bit further still: good chocolate cake is the height of human achievement.In the world of enterprise IT, one could say the same of a […]

Overcoming Challenges in Governing Scanner Adoption – Step by Step

Originally published by Dazz.IntroductionReady to tackle a challenging topic for DevSecOps and security teams in the application security space? Ready or not—let’s talk about increasing and governing the adoption of scanners.The Application Security ProcessApplication security is a labyrinth with myriad stages and steps as applications are developed internally. Within development processes, there are multiple points […]

Current Challenges with Managing Permissions and API Keys

Recent CSA survey data shows that organizations are struggling to manage permissions and API keys. (API keys are the codes used to authenticate users and applications.) Keep in mind that API keys are also a type of non-human identity (NHI). An NHI is a digital construct used for machine-to-machine access and authentication. NHIs present unique […]

Fundamentals of Cloud Security Stress Testing

Originally published by Pentera.“Defenders think in lists, attackers think in graphs” said John Lambert from Microsoft, distilling the fundamental difference in mindset between those who defend IT systems and those who try to compromise them.The traditional approach for defenders is to list security gaps directly related to their assets in the network and eliminate as […]