News

AI governance, compliance automation, third-party risk, and building trust to enhance your organization's security strategy.
Explore how recent cyberattacks reveal gaps in cloud and SaaS security for critical infrastructure and learn what steps can mitigate future threats.
Look at evolving compliance challenges and how secure Managed File Transfer (MFT) is helping organizations keep up with ...
Prefer to access this resource without an account? Download it now. We value your privacy. Our website uses analytics and advertising cookies to improve your browsing ...
Founded in 2013 by the Cloud Security Alliance, the Security Trust Assurance and Risk (STAR) registry encompasses key principles of transparency, rigorous auditing, and cloud security and privacy best ...
Founded in 2013 by the Cloud Security Alliance, the Security Trust Assurance and Risk (STAR) registry encompasses key principles of transparency, rigorous auditing, and cloud security and privacy best ...
Written by Ken Huang, CSA Fellow and Co-Chair of AI Working Groups, CEO of DistributedApps.ai, and AI Book Author; and Dr. Idan Habler, Staff AI Security Researcher at Intuit, specializing in AI ...
Thomas Jefferson famously proclaimed that all men are created equal, but he would agree that today’s technical problems are not. Some are tied to the quirks of a specific product or vendor, while ...
Founded in 2013 by the Cloud Security Alliance, the Security Trust Assurance and Risk (STAR) registry encompasses key principles of transparency, rigorous auditing, and cloud security and privacy best ...
SAN FRANCISCO (RSA Conference) and SEATTLE - April 29, 2025 - The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications and best practices to ...
Written by Lea Edelstein, Sweet Security. Cloud security has undergone a rapid evolution over the past few years. Initially, organizations relied on CSPM to identify misconfigurations in their cloud ...