Category Archives: Cloud Security Alliance

Category Added in a WPeMatico Campaign

Pioneering Transparency: Oklahoma’s Proposed Artificial Intelligence Bill of Rights

Originally published by Truyo.In the ever-evolving landscape of technology, the emergence of artificial intelligence (AI) has brought both promise and challenge. With AI permeating various aspects of our lives, from customer service interactions to content creation, ensuring transparency, accountability, and user control becomes paramount. Recognizing this need, Oklahoma stands at the forefront of innovation with […]

The DORA Quest: Beware of Vendors with Magic Beans

Originally published by Own Company.Written by Matthew O’Neill, Field CTO, Own Company.You can’t escape the sheer volume of vendors sharing information about the Digital Operational Resilience Act (DORA) and how buying their tooling will make you compliant, which we all know is nonsense. DORA is upon us, and crafting the right outcome will require new […]

Zero Footprint Attacks: 3 Steps to Bypass EDR with Reflective Loading

Originally published by Pentera.EDR (Endpoint Detection and Response) evasion techniques are becoming increasingly common amongst attackers as they evolve their strategies to bypass security measures without being detected. There are many different types of EDR evasion techniques, many of which are listed on the MITRE ATT&CK website. The complexity and evolution of these methods vary […]

Five Levels of Vulnerability Prioritization: From Basic to Advanced

Originally published by Dazz.Vulnerabilities are being disclosed at record pace. Since the common vulnerabilities and exposures (CVE) program was established by MITRE in 1999, there have been over 300,000 unique vulnerabilities published – and a significant portion of these have been found in the last few years.Since many of these vulnerabilities are disclosed in software […]

The Top Ten IT Outages in History

Editorial Note: The lessons learned and changes that may result from the CrowdStrike incident may take quite some time to fully understand. CSA is providing a platform for member experts to weigh in on this issue. The opinions of this article represent those of the member, not those of CSA.Written by Javier Perez, Sr. Director […]

Can You Have Bulletproof Security Without Network Lag? Unveiling the Secret

Written by Vaibhav Dutta, Associate Vice President and Global Head – Cybersecurity Products & Services, Tata Communications. Originally published by CRN.Securing a modern enterprise network can feel like a high-wire act. Complex security measures, can slow down critical applications, hindering operational efficiency and productivity. Conversely prioritising ease of application access and performance over security can […]

The State of Cyber Resiliency in Financial Services

Written by Troy Leach, Chief Strategy Officer and John Yeoh, Global VP of Research, CSA. Global disruptions, changing regulatory oversight, and emerging AI threats are just some of the issues that cybersecurity professionals must prepare for today. In the upcoming report “Cloud Resiliency in Financial Services,” CSA analyzed industry-wide survey data to identify the key […]

14 Essential Steps to a Secure Salesforce Environment

Originally published by Suridata.IntroductionSalesforce.com has been so successful that we tend to forget what a breakthrough it was when it debuted 25 years ago. At the time, people were skeptical that you could get enterprise-grade functionality on a browser. They were mistaken. The software-as-a-service (SaaS) revolution that Salesforce had a key role in launching is […]

Building a Fortress of ‘Never Trust, Always Verify’: The Power of Zero Trust Architecture

Originally published by CXO REvolutionaries.Written by Ben Corll, CISO in Residence, Zscaler.There’s no succinct instruction manual for zero trust architecture, but here’s the next best thing Recent headlines about critical vulnerabilities plaguing VPNs and other legacy infrastructure are a sign that the traditional “castle-and-moat” approach to network security – perimeter-based defenses and implicit trust within […]

What are Machine Credentials, And Why Are They Important to Secure in Your Organization?

Originally published by Astrix.WHAT are Machine Credentials?Machine Credentials are a collective noun for Non-human Identities that operate as digital access keys used by systems. They are used to authenticate and communicate securely with other applications or services in the organization’s environment. By verifying a machine’s unique identity, machine credentials allow safe, agreed-upon interaction. Machine credentials […]