News

QR codes promise convenience, but most people don’t realize the sheer ease with which those codes can be weaponized. Learn ...
CSA's AI Controls Matrix represents a paradigm shift in AI governance, providing the first comprehensive framework designed ...
Guidance for SMBs transitioning to a Zero Trust architecture. Explore key components such as identity verification, endpoint security, & network segmentation. Korean translation.
CISA released Microsegmentation in Zero Trust, Part One: Introduction and Planning as part of its ongoing efforts to support US Federal Civilian agencies implementing zero trust architectures (ZTAs).
A Commitment to Innovation and Care: How Houston Eye Is Building Cyber Resilience with Illumio. “Before Illumio, it was a matter of when, not if, a breach would happen,” Hornberger shared. “Now, if ...
QR codes promise convenience, but most people don’t realize the sheer ease with which those codes can be weaponized. Learn more about the new “quishing” threat.
This comprehensive glossary combines all the glossaries created by CSA Working Groups and research contributors into one place. If you have a question or need other assistance please reach out to ...
Traditional cybersecurity risk management is becoming ineffective. This survey report shows how data security risk assessment practices still need to change.
Learn why it's important to adopt a risk-based approach to AI governance. Learn how to address AI challenges, regulatory concerns, and concerns about AI ethics.
Learn the core concepts, best practices and recommendation for securing an organization on the cloud regardless of the provider or platform. Covering all 14 domains from the CSA Security Guidance v4, ...
This document is the companion document to the Methodology for the Mapping of the Cloud Controls Matrix (CCM). It is a CCM mapping workpackage template that can be used by organizations who want to ...