News
CSA's AI Controls Matrix represents a paradigm shift in AI governance, providing the first comprehensive framework designed ...
Guidance for SMBs transitioning to a Zero Trust architecture. Explore key components such as identity verification, endpoint security, & network segmentation. Korean translation.
CISA released Microsegmentation in Zero Trust, Part One: Introduction and Planning as part of its ongoing efforts to support US Federal Civilian agencies implementing zero trust architectures (ZTAs).
A Commitment to Innovation and Care: How Houston Eye Is Building Cyber Resilience with Illumio. “Before Illumio, it was a matter of when, not if, a breach would happen,” Hornberger shared. “Now, if ...
QR codes promise convenience, but most people don’t realize the sheer ease with which those codes can be weaponized. Learn more about the new “quishing” threat.
The flexibility and scalability of virtualization comes with significant risks if security and management practices are not ...
CSA is moving toward a more streamlined community experience for joining working groups, connecting with local chapters, and engaging with training communities.
QR codes promise convenience, but most people don’t realize the sheer ease with which those codes can be weaponized. Learn ...
Steer clear of the dangers of oversharing on social media. This blog offers examples of what can go wrong and easy-to-follow ...
CSA’s CCM includes cloud security monitoring and logging controls. Implement effective incident response, audit log security, clock synchronization, and more.
Several critical data governance and security vulnerabilities contributed to the 2023 Toyota data breach, including misconfiguration and inadequate controls.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results