Category Archives: Cloud Security Alliance

Category Added in a WPeMatico Campaign

Can GenAI Services Be Trusted? | At the Discovery of STAR for AI

Whenever new technologies are introduced into our personal lives, organizations, or even society as a whole, we always ask the same question: Can I trust it?Most recently, how many of us have asked ourselves whether, how, and within which limits we can trust LLM/GenAI services and their providers? This is a legitimate question, given that […]

How Can ISO/IEC 42001 & NIST AI RMF Help Comply with the EU AI Act?

Contributed by Accedere.Written by Ashwin Chaudhary, CEO, Controllo.ai.The adoption of AI technologies has skyrocketed in the last few years. In 2019, 58% of organizations used AI for at least one business function; by 2024, that number jumped to 72%. The use of genAI nearly doubled from 2023 to 2024, going from just 33% to 65%. […]

Cloud Security Alliance Issues SaaS AI-Risk for Mid-Market Organizations Survey Report

Report looks to help mid-market organizations manage their expanding Software as a Service (SaaS) environments SEATTLE – Jan. 28, 2025 – Mid-market organizations today are engaged in a unique balancing act, where they are required to manage and defend a growing digital footprint, but lack the deep pockets and vast resources of their larger counterparts. […]

What to Expect When Starting Out With Microsegmentation

Originally published by Illumio.Written by Christer Swartz, Solutions Marketing Director, Illumio.According to Gartner, “By 2026, 60% of enterprises working toward zero trust architecture will use more than one deployment form of microsegmentation, which is up from less than 5% in 2023.” Microsegmentation is foundational to zero trust. You can’t achieve zero trust without it. In […]

Understanding Domain Generation Algorithms (DGAs)

Originally published by Zscaler.Domain generation algorithms (DGAs) are an at least semi-sophisticated technique used by malware authors and distributors to ensure the resilience and adaptability of their malicious infrastructure. DGAs dynamically generate multiple domain names that act as rendezvous points between malware and their command and control (C2) servers. Here we’ll dive into what DGAs […]

What is Third-Party Risk Management and Why Does It Matter?

Originally published by Schellman.Written by Sara Mylin.As threats continue to evolve and grow more creative and sophisticated, cybersecurity remains a paramount concern of organizations everywhere. But these days, it’s not enough to implement the necessary data to protect the data in your systems—more and more, bad actors are targeting third-party providers as a backdoor into […]

Cloud Security Alliance Issues Series of Tools to Assist Organizations in Mitigating Cybersecurity Risks Associated with Distributed Ledger Technology

Documents provide critical resources for creating a more secure environment for all shared network participantsSEATTLE – Jan. 23, 2025 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment, today released the Distributed Ledger Technology (DLT) Cybersecurity Governance […]

SOC Expert Perspectives: 5 Key Social Engineering Threats

Originally published by Abnormal Security.Written by Mick Leach.Social engineering attacks are an escalating threat to modern organizations, with data breaches caused by these tactics taking an average of 257 days to contain, as revealed in IBM’s 2024 Cost of a Data Breach Report. Additionally, social engineering was used in 30% of breaches in 2023 alone, […]

Solving the Cyber Workforce Puzzle

Originally published by CXO REvolutionaries.Zscaler EVP, Customer Experience & Transformation Kavitha Mariappan recounts her conversation with CISA Director Jen Easterly and Girls Who Code CEO Dr. Tarika Barrett.Ernő Rubik said “If you are curious, you will find the puzzles around you and, if you are determined, you will solve them.” CISA Director Jen Easterly used […]

Cloud Security Alliance and Whistic Partner to Advance Secure and Responsible Development of Artificial Intelligence (AI) Technologies

Organizations collaborate on mutual goal of evaluating risks and defining controls related to Generative Artificial IntelligenceSEATTLE – Jan. 20, 2025 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment, and Whistic, the leading AI-first modern platform for […]

This site uses cookies to offer you a better browsing experience. By browsing this website, you agree to our use of cookies. Click More Info to view Privacy Policy.