News

Join other AI-forward organizations in taking CSA’s AI Trustworthy Pledge–a public commitment to developing and managing AI responsibly. Whether you’re building AI, offering AI services, or ...
CSA Chapters unite cloud security professionals worldwide, fostering collaboration, knowledge-sharing, and career growth. CSA Chapter connects you to a vibrant local and global community. Whether you ...
Founded in 2013 by the Cloud Security Alliance, the Security Trust Assurance and Risk (STAR) registry encompasses key principles of transparency, rigorous auditing, and cloud security and privacy best ...
Enterprises today face rapidly changing threats as never before. From combating viruses aimed at extorting money from individuals like the FBI virus to more sophisticated viruses like Stuxnet ...
The Enterprise Resource Planning (ERP) working group seeks to develop best practices to enable organizations that run their business on large ERP implementations, such as SAP or Oracle applications, ...
Founded in 2013 by the Cloud Security Alliance, the Security Trust Assurance and Risk (STAR) registry encompasses key principles of transparency, rigorous auditing, and cloud security and privacy best ...
Originally published by BARR Advisory here. Written by Claire McKenna, BARR Advisory. Uber is the latest prominent company to have a security breach as a result of social engineering. They’re not ...
Founded in 2013 by the Cloud Security Alliance, the Security Trust Assurance and Risk (STAR) registry encompasses key principles of transparency, rigorous auditing, and cloud security and privacy best ...
Malware utilizes a multitude of techniques to avoid detection, and threat actors are continuously uncovering and exploiting new methods of attack. One of the less common techniques includes the ...
We value your privacy. Our website uses analytics and advertising cookies to improve your browsing experience. Read our full Privacy Policy.
Founded in 2013 by the Cloud Security Alliance, the Security Trust Assurance and Risk (STAR) registry encompasses key principles of transparency, rigorous auditing, and cloud security and privacy best ...
Look at evolving compliance challenges and how secure Managed File Transfer (MFT) is helping organizations keep up with ...