The Enterprise Resource Planning (ERP) working group seeks to develop best practices to enable organizations that run their business on large ERP implementations, such as SAP or Oracle applications, ...
Proactive communication, collaboration, and decisive action can turn a security breach into an opportunity for a stronger ...
The goal of this group is to develop security guidance to encourage cloud providers, asset owners and device manufacturers towards adopting best practices to secure industrial control systems. We ...
Learn how the Cloud Shared Security Responsibility Model and the Cloud Controls Matrix work together in this summary of a ...
CSA Research promotes cybersecurity best practices. In this interview, CEO Jason Garbis describes his work with CSA’s Zero ...
Gain expertise in Zero Trust with CSA’s Certificate of Competence in Zero Trust (CCZT). Elevate your security skills and advance your career. This October, join us in raising awareness about essential ...
In a Multi-Turn Attack, a malicious user starts with a benign AI prompt and gradually escalates it. Multi-Turn Attacks are ...
Staying on top of cloud security has never been more important for organizations. Since 2009, CSA Corporate Membership has provided invaluable benefits to security, cloud, technology, and business ...
CSA interviews one of Paperclip’s Compliance Officers about their contributions to CSA’s data security research and how the ...
Written by Megan Theimer, Content Program Specialist, CSA. Has someone brought up the CSA STAR Program or the CSA Cloud Controls Matrix and you have no idea what that means? This blog is the place to ...
Originally published by BARR Advisory. Written by Cody Hewell and Brett Davis. A report by Proofpoint indicated that nearly 70% of CISOs feel their organization is at risk of experiencing a material ...