Repsol is committed to meeting net-zero carbon emissions by 2050 with the help of GenAI. However, GenAI must be implemented ...
Non-human identities (NHIs) have emerged as a critical component of modern cloud environments. However, they are also a ...
Use two frameworks in unison to control your attack surface & threat exposure: zero trust architecture (ZTA) & continuous ...
Compliance debt arises from outdated processes and tools. Reset workflows, streamline tasks, and adopt scalable solutions for ...
Legacy IT solutions fall short in today’s threat landscape. Zero Trust and modern architectures are needed to stay resilient, secure hybrid work, and future-ready.
SEATTLE – Jan. 29, 2025 – Today, the Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud ...
Written by Daniele Catteddu, Chief Technology Officer, CSA. Whenever new technologies are introduced into our personal lives, organizations, or even society as a whole, we always ask the same question ...
We value your privacy. Our website uses analytics and advertising cookies to improve your browsing experience. Read our full Privacy Policy.
Written by Kurt Seifried, Chief Innovation Officer, CSA. AI Usage Statement: This research was done with Claude Desktop, Web Search, Web Document Fetch, and Sequential Thinking. Claude wrote the ...
As a security practitioner or CISO, you likely find yourself in a rapidly evolving landscape where the adoption of AI is both a game-changer and a challenge. In the recent webinar, Safe AI Adoption: ...
Learn the core concepts, best practices and recommendation for securing an organization on the cloud regardless of the provider or platform. Covering all 14 domains from the CSA Security Guidance v4, ...