News

The Enterprise Resource Planning (ERP) working group seeks to develop best practices to enable organizations that run their business on large ERP implementations, such as SAP or Oracle applications, ...
This working group aims to develop a holistic Cloud Incident Response framework that comprehensively covers key causes of cloud incidents (both security and non-security related), and their handling ...
CSA and Northeastern University’s Trusted AI Safety Knowledge Certification Program trains professionals to build, secure, ...
Walk through what makes Kubernetes security so challenging and how security teams can get started with it in a way that sets ...
The Cloud Controls Matrix (CCM) is a framework of controls that are essential for cloud computing security. It is created and updated by CSA and aligned to CSA best practices. You can use CCM to ...
As cyber threats get smarter, companies are using Zero Trust Security Models to keep their data safe. This way of thinking ...
It's no secret: many organizations view and treat phishing as a periodic checkbox assessment. It’s often a basic email template sent to an entire organization. If someone clicks the link, they are ...
As AI research advances, model distillation will likely expand into new applications and improve the ability to address ...
Explore key cloud security challenges and strategies to protect digital assets, ensuring resilience in today's hybrid and ...