Strong passwords reduce the risk of data breaches by making it harder for cybercriminals to guess or steal your credentials, a key defense in today's digital age.
CSA has identified a need for open standards and tooling that can enable the automation of compliance activities and a more ...
As LLMs gain popularity, learn how to secure your AI attack surface and implement AI application security through fundamental ...
Understand the implications of session hijacking, how to detect it, and why identifying potential hijacking threats is ...
Gain expertise in Zero Trust with CSA’s Certificate of Competence in Zero Trust (CCZT). Elevate your security skills and advance your career. This October, join us in raising awareness about essential ...
Learn the core concepts, best practices and recommendation for securing an organization on the cloud regardless of the provider or platform. Covering all 14 domains from the CSA Security Guidance v4, ...
Written by Andrew Winney, General Manager and Global Head of SASE Business, Tata Communications. Originally published on CXOtoday. In today's digitally connected world, businesses face unprecedented ...
Written by Megan Theimer, Content Program Specialist, CSA. Has someone brought up the CSA STAR Program or the CSA Cloud Controls Matrix and you have no idea what that means? This blog is the place to ...
Written by Ken Huang, CEO of DistributedApps.ai and VP of Research at CSA GCR. I recently attended Cloud Security Alliance's AI Controls Working Group's face-to-face meetings in Seattle. One ...
CSA Community Spotlight: Promoting Data Security Best Practices with Compliance Officer Rocco Alfonzetti, Jr. Written by Megan Theimer, Content Program Specialist, CSA. Today we’re chatting with Rocco ...
The Enterprise Resource Planning (ERP) working group seeks to develop best practices to enable organizations that run their business on large ERP implementations, such as SAP or Oracle applications, ...