Originally published by Schellman. Written by Austin Bentley, Manager, Schellman. When people hear of an upcoming pen test, they most commonly think of network testing. These tests can be focused against your external network (i.e. network perimeter) or your internal network (cloud environment and/or on-premises network). As these networks typically change year to year with new devices, […]
Category Archives: Cloud Security Alliance
Category Added in a WPeMatico Campaign
Written by Koat.ai. The First Flight into AI Initiatives In the ever-evolving landscape of business, AI Pilot Programs offer a structured approach for companies to harness the potential of artificial intelligence. These initiatives provide a testing ground where businesses can refine their strategies and align AI technologies with their specific goals. By implementing AI […]
Written by Kurt Seifried, Chief Innovation Officer, CSA. The Story That Shook the Markets In January 2025, a relatively unknown Chinese AI company called DeepSeek burst onto the global stage with a bold claim—they had built advanced AI models that matched or exceeded the capabilities of tech giants like OpenAI and Google—at a tiny fraction of […]
Originally published by Reemo. Hybrid work has emerged as a dominant organizational model, with a significant portion of the global workforce embracing this flexible approach. While it offers numerous benefits, it also introduces complex security challenges that organizations must address to protect their valuable assets. The rise of hybrid work and its security […]
Originally published by Synack. New year, new regulations. In late December 2024, the U.S. Department of Health and Human Services (HHS) issued a proposal to modify the Health Insurance Portability and Accountability Act’s (HIPAA) Security Rule, with an overarching goal of strengthening the cybersecurity programs of healthcare organizations and protecting patient data from malicious adversaries. […]
Originally published by Koat. What is an AI Agent? AI agents are advanced autonomous systems designed to perform specific tasks, make decisions, and collaborate with humans and other AI systems. Unlike traditional automation tools, they have machine learning, natural language processing (NLP), and decision-making capabilities, allowing them to adapt and learn with minimal human […]
How and when you should switch to post-quantum Written by Cory Missimore of the CSA Quantum-Safe Security Working Group. Reviewed by Bruno Huttner, Mehak Kalsi, and Mahesh Adulla. NIST is helping companies and governments prepare for PQC As quantum computing technology continues to advance, so does the urgency for organizations to rethink their approach to cybersecurity. Many […]
Originally published by Abnormal Security. Since the public release of ChatGPT two years ago, the field of artificial intelligence has grown tremendously in both good ways and bad. There’s no denying that the rapid evolution of AI has brought transformative benefits to numerous fields, including cybersecurity. But it has also introduced new challenges as […]
Written by Joseph Wilson and the CSA FHE Working Group. Questions of privacy and security are at the forefront of every deployment of Fully Homomorphic Encryption (FHE). In this blog post, we provide insight that will help you to evaluate FHE solutions when answering the following questions: Is this solution secure? Who says so, […]
Written by Neelakantan Venkataraman, Vice President & Global Head of Cloud & Edge Business, Tata Communications. Originally published by Frontier Enterprise. The world is captivated by AI’s impressive deployment, but the real profits lie in reassessing operational models. As Singapore’s Minister for Digital Development and Information, Josephine Teo, noted, an internationally agreed-upon framework for AI governance […]