News

The flexibility and scalability of virtualization comes with significant risks if security and management practices are not ...
CSA is moving toward a more streamlined community experience for joining working groups, connecting with local chapters, and engaging with training communities.
CISA released Microsegmentation in Zero Trust, Part One: Introduction and Planning as part of its ongoing efforts to support US Federal Civilian agencies implementing zero trust architectures (ZTAs).
CSA's AI Controls Matrix represents a paradigm shift in AI governance, providing the first comprehensive framework designed for trustworthy AI implementation.
QR codes promise convenience, but most people don’t realize the sheer ease with which those codes can be weaponized. Learn ...
Steer clear of the dangers of oversharing on social media. This blog offers examples of what can go wrong and easy-to-follow ...
Learn what e‑skimming is, why it’s so dangerous, how PCI DSS v4.x addresses it, and some of the options available to help you ...
CSA’s CCM includes cloud security monitoring and logging controls. Implement effective incident response, audit log security, clock synchronization, and more.
Walk through how to build a complete system using the Model Context Protocol (MCP), a framework designed to bridge the gap between LLMs and external tools.
Reporting is one of the most important parts of being a CISO. There’s a big difference between saying “trust me, we’re secure” and proving it with data.
Case studies articulate cloud computing’s most significant and pressing issues SAN FRANCISCO (RSA Conference) and SEATTLE - April 29, 2025 - The Cloud Security Alliance (CSA), the world’s leading ...
Explore how AI and data privacy are reshaping global business, driving innovation, and demanding agile, ethical governance across industries.