Category Archives: Cloud Security Alliance

Category Added in a WPeMatico Campaign

Cloud Security Alliance Incorporates Strategy Domain into Scope of Certificate of Competence in Zero Trust (CCZT) Exam

Addition ensures security professionals are best prepared to implement and manage their Zero Trust environmentsSEATTLE – Aug. 27, 2024 – To better equip professionals with the essential knowledge they need to understand and implement Zero Trust principles, the Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and best practices to […]

Securing the Future of HPC: Implementing Zero Trust and Strengthening Network Security

Written by CSA’s High Performance Computing Working Group. High-Performance Computing (HPC) systems are pivotal in driving scientific research and innovation, offering computational power that exceeds conventional computing architectures. However, the complexity and scale of these systems introduces unique security challenges that must be addressed to protect sensitive data and maintain research integrity. As HPC environments […]

Understanding the Differences Between Fully Homomorphic Encryption and Confidential Computing

Written by Ryan Gifford, Jez Goldstone, and Joseph Wilson.In the realm of data security and privacy, Fully Homomorphic Encryption (FHE) and Confidential Computing are two cutting-edge technologies that have garnered significant attention. While both aim to protect sensitive information, they do so in fundamentally different ways and are suited for various use cases. Depending on […]

Colorado Artificial Intelligence Act Passes with Affirmative Defense Provision

Originally published by Truyo.In a groundbreaking move, Colorado is poised to become the pioneer state in regulating the use of high-risk artificial intelligence (AI) systems. The Colorado Artificial Intelligence Act (SB 205), recently passed by the state legislature, represents a significant step forward in addressing the complex ethical and legal implications of AI technology. If […]

Building vs. Buying an ASPM Solution (And What We Can Learn from Raising Tamagotchis)

Originally published by Dazz.Let’s travel back in time to the mid ‘90’s, shall we?Tamagotchis—those adorable, electronic virtual pets—were introduced to the market in 1996 and absolutely exploded. In less than a year, Bandai had sold more than 10 million little e-critters, and to date, over 91 million units have been sold. They were the most […]

Driving AI Value in Security and Governance

Originally published by CXO REvolutionaries.Written by Rob Sloan, VP, Cybersecurity Advocacy, Zscaler.At Zscaler’s latest Women in Technology and Security CXO event at the RSA Conference in San Francisco, EVP of Customer Experience and Transformation, Kavitha Mariappan, hosted tech leaders to discuss AI’s potential for achieving more in the areas of security and governance. The following […]

Top Threat #1 – Misconfig Misadventures: Taming the Change Control Chaos

Written by CSA’s Top Threats Working Group.In this blog series, we cover the key security challenges from CSA’s Top Threats to Cloud Computing 2024. Drawing from insights of over 500 experts, we’ll discuss the 11 top cybersecurity threats, their business impact, and how to tackle them. Whether you’re a professional or a beginner, this series […]

Return of the RCE: Addressing the regreSSHion Vulnerability – CVE-2024-6378

Originally published by Pentera. A Regrettable Resurgence On July 1, 2024, the Qualys Threat Research Unit (TRU) published their discovery of an unauthenticated remote code execution (RCE) vulnerability in OpenSSH, a tool for secure remote connectivity using the Secure Shell (SSH) protocol. The bug, assigned CVE-2024-6387, is a regression of a previously patched vulnerability, impacting […]

Avoiding Collapse in a Tech-Stacked World: How Staying Still Can Create Fragile Defences

Written by Vaibhav Dutta, Associate Vice President and Global Head-Cybersecurity Products & Practice, Tata Communications.Originally published on Frontier Enterprise.Ransomware activity alone was up 50% year-on-year during the first half of 2023. We have been seeing a relentless rise in the number and sophistication of cyber threats, with ransomware incidents reporting a 13% increase while phishing […]

4 Steps for a Unified, Effective, and Continuous Compliance Program

Originally published by Scrut Automation.Regulatory Maze is Turning Everyone into a Lost Tourist The growing complexity of regulatory requirements has led to fragmentation in compliance programs across organizations of all sizes. Efforts to develop and enforce consolidated compliance programs still lack coordination and standardization, further deepening the security and compliance gaps ripe for exploitation and […]