Hear from Willy Fabritius, Global Head of Strategy at SGS. Discover the cybersecurity insights that Willy has learned ...
Explore how AI is shaping the future of cybersecurity on both ends: empowering defenders and assisting attackers. Also have a ...
Learn about CISO Alex Getsin’s contributions to CSA Research, including the Top Threats series, and why he continues to stay ...
Strengthen Google Workspace security by moving beyond app-specific passwords, enforcing MFA, and transitioning to OAuth or ...
The Alert Readiness Framework aligns with Gartner's augmented cybersecurity vision, enhancing resilience, streamlining tools, ...
Get an overview of the major challenges that the Common Vulnerabilities and Exposures (CVE) program faces in today’s ...
Learn the core concepts, best practices and recommendation for securing an organization on the cloud regardless of the provider or platform. Covering all 14 domains from the CSA Security Guidance v4, ...
Originally published by BARR Advisory. Artificial intelligence (AI) is transforming the way businesses operate across ...
Privileged access management vendors are claiming they can provide access with zero standing privileges (ZSP). Dig into some ...
Learn about Pete Chronis’ multifaceted involvement with CSA and how he sees CSA contributing to the future of cloud and ...
When seeking ISO 42001:2023 certification, you must ensure that your artificial intelligence management system (AIMS) aligns with the standard’s key clauses (4-10), each of which focuses on a specific ...
As many of you have read my past blogs, I like to quote individuals who have had experience in certain subjects. Although the ...