Cloud Security Alliance
Extreme Networks announces ExtremeCloud IQ CoPilot to empower taxed network administrators
Extreme Networks announced a public beta of ExtremeCloud IQ CoPilot, a subscription level available within the ExtremeCloud IQ platform. CoPilot is designed to deliver …
Extreme Networks achieves three ISO certifications for information security and data protection
Extreme Networks announced it is triple-certified to International Standards Organization (ISO) criteria for its adherence to information security management systems best …
58% of IT and security pros concerned about security in the cloud
The Cloud Security Alliance and AlgoSec published research which queried nearly 1,900 IT and security professionals from a variety of organization sizes and locations, sought …
Cloud Controls Matrix v4 adds 60+ new cloud security controls
The Cloud Security Alliance (CSA) announced the availability of version 4 of the Cloud Controls Matrix (CCM), CSA’s cybersecurity framework for cloud computing. The CCM v4 …
CSA releases paper that calls out five security challenges that can lead to adversaries’ success
The Cloud Security Alliance (CSA) released Cloud-Based, Intelligent Ecosystems – Redefining Intelligence & Driving to Autonomous Security Operations. The paper …
Half of IT teams can’t fully utilize cloud security solutions due to understaffing
There are unrealized gaps between the rate of implementation or operation and the effective use of cloud security access brokers (CASB) within the enterprise, according to a …
Cloud Security Alliance and ISSA unite to build, support, and strengthen the cybersecurity community
The Cloud Security Alliance (CSA) and the International Systems Security Association (ISSA) announced that the two parties have signed a memorandum of understanding (MOU) to …
Privacy and security concerns related to patient data in the cloud
The Cloud Security Alliance has released a report examining privacy and security of patient data in the cloud. In the wake of COVID-19, health delivery organizations (HDOs) …
Why is SDP the most effective architecture for zero trust strategy adoption?
Software Defined Perimeter (SDP) is the most effective architecture for adopting a zero trust strategy, an approach that is being heralded as the breakthrough technology for …
How to implement least privilege in the cloud
According to a recent survey of 241 industry experts conducted by the Cloud Security Alliance (CSA), misconfiguration of cloud resources is a leading cause of data breaches. …
Panorays and CSA partner to deliver visibility into SaaS and cloud providers
Panorays are partnering with the Cloud Security Alliance (CSA) to be a licensed distributor of the CSA’s Consensus Assessment Initiative Questionnaire (CAIQ). Panorays CTO …
5 considerations for building a zero trust IT environment
Zero trust isn’t a product or service, and it’s certainly not just a buzzword. Rather, it’s a particular approach to cybersecurity. It means exactly what it says – not …
Featured news
Resources
Don't miss
- Cargo theft malware actor spent a month inside a decoy network before researchers pulled the plug
- EU cybersecurity standards are at risk if supplier ban passes
- What the EU AI Act requires for AI agent logging
- Webinar: The IT Leader’s Guide to AI Governance
- OpenAI expands its cyber defense program with GPT-5.4-Cyber for vetted researchers