News

Several critical data governance and security vulnerabilities contributed to the 2023 Toyota data breach, including ...
Every major compliance framework, including PCI DSS, GDPR, and ISO 27001, requires strong access controls. Yet Non-Human ...
As telecom networks embrace cloud-native to power 5G, the importance of Zero Trust has never been greater. A recent ...
SOC 1 reports verify internal controls for financial data, which is essential for trust, sales, and SOX compliance. Here's ...
One of most essential features of the Security Trust Assurance and Risk (STAR) program is its registry that documents the security and privacy controls provided by popular cloud computing offerings.
SOC 1 reports verify internal controls for financial data, which is essential for trust, sales, and SOX compliance. Here's when and why you need one.
Every major compliance framework, including PCI DSS, GDPR, and ISO 27001, requires strong access controls. Yet Non-Human Identities (NHIs) are often overlooked.
As telecom networks embrace cloud-native to power 5G, the importance of Zero Trust has never been greater. A recent assessment of a 5G core network shows why.
This comprehensive glossary combines all the glossaries created by CSA Working Groups and research contributors into one place. If you have a question or need other assistance please reach out to ...
Join a Worldwide Professional Network with CSA Chapters Build connections, grow your expertise, and shape the future of cloud security—locally and globally.
This document outlines a Cloud Security Alliance (CSA) initiated protocol for the Software Defined Perimeter specification, and requests discussion and suggestions for improvements.
As Industrial Control Systems (ICS) advance to interacting externally via IoT platforms and the cloud, it has increased the opportunity for cyberattacks. Learn best practices for security these ...