Category Archives: Cloud Security Alliance

Category Added in a WPeMatico Campaign

Don’t Buy A Network Pen Test Until You Ask These Questions

Originally published by Schellman. Written by Austin Bentley, Manager, Schellman.   When people hear of an upcoming pen test, they most commonly think of network testing. These tests can be focused against your external network (i.e. network perimeter) or your internal network (cloud environment and/or on-premises network). As these networks typically change year to year with new devices, […]

A Guide On How AI Pilot Programs are Shaping Enterprise Adoption

Written by Koat.ai.   The First Flight into AI Initiatives  In the ever-evolving landscape of business, AI Pilot Programs offer a structured approach for companies to harness the potential of artificial intelligence. These initiatives provide a testing ground where businesses can refine their strategies and align AI technologies with their specific goals. By implementing AI […]

DeepSeek: Behind the Hype and Headlines

Written by Kurt Seifried, Chief Innovation Officer, CSA.   The Story That Shook the Markets In January 2025, a relatively unknown Chinese AI company called DeepSeek burst onto the global stage with a bold claim—they had built advanced AI models that matched or exceeded the capabilities of tech giants like OpenAI and Google—at a tiny fraction of […]

Hybrid Work: Navigating Security Challenges in the Modern Enterprise

Originally published by Reemo.   Hybrid work has emerged as a dominant organizational model, with a significant portion of the global workforce embracing this flexible approach. While it offers numerous benefits, it also introduces complex security challenges that organizations must address to protect their valuable assets.   The rise of hybrid work and its security […]

Strengthening Cybersecurity in Healthcare: Newly Proposed HIPAA Rules to Include Pentesting

Originally published by Synack.   New year, new regulations. In late December 2024, the U.S. Department of Health and Human Services (HHS) issued a proposal to modify the Health Insurance Portability and Accountability Act’s (HIPAA) Security Rule, with an overarching goal of strengthening the cybersecurity programs of healthcare organizations and protecting patient data from malicious adversaries.  […]

AI Agents in 2025: The Next Frontier of Corporate Success

Originally published by Koat.   What is an AI Agent? AI agents are advanced autonomous systems designed to perform specific tasks, make decisions, and collaborate with humans and other AI systems. Unlike traditional automation tools, they have machine learning, natural language processing (NLP), and decision-making capabilities, allowing them to adapt and learn with minimal human […]

NISTIR 8547: From PQC Standards to Real-World Implementations

How and when you should switch to post-quantum Written by Cory Missimore of the CSA Quantum-Safe Security Working Group. Reviewed by Bruno Huttner, Mehak Kalsi, and Mahesh Adulla.   NIST is helping companies and governments prepare for PQC As quantum computing technology continues to advance, so does the urgency for organizations to rethink their approach to cybersecurity. Many […]

Understanding Offensive AI vs. Defensive AI in Cybersecurity

Originally published by Abnormal Security.   Since the public release of ChatGPT two years ago, the field of artificial intelligence has grown tremendously in both good ways and bad. There’s no denying that the rapid evolution of AI has brought transformative benefits to numerous fields, including cybersecurity. But it has also introduced new challenges as […]

Assessing the Security of FHE Solutions

Written by Joseph Wilson and the CSA FHE Working Group.   Questions of privacy and security are at the forefront of every deployment of Fully Homomorphic Encryption (FHE). In this blog post, we provide insight that will help you to evaluate FHE solutions when answering the following questions: Is this solution secure? Who says so, […]

Gaining the Edge (Literally!) Through Edge Computing

Written by Neelakantan Venkataraman, Vice President & Global Head of Cloud & Edge Business, Tata Communications. Originally published by Frontier Enterprise.   The world is captivated by AI’s impressive deployment, but the real profits lie in reassessing operational models. As Singapore’s Minister for Digital Development and Information, Josephine Teo, noted, an internationally agreed-upon framework for AI governance […]

This site uses cookies to offer you a better browsing experience. By browsing this website, you agree to our use of cookies. Click More Info to view Privacy Policy.