Learn how AI log analysis enhances security. Reduce the load on SOC teams so they can focus on judgment, context, and ...
Salesloft breach shows how OAuth tokens abused by trusted apps enable data exposure, underscoring the need for Zero Trust and ...
The SaaS Security Capability Framework (SSCF) v1.0 introduces practical, actionable controls for SaaS security, guiding ...
In the 2024 Microsoft hack, Midnight Blizzard gained access to Microsoft employees’ emails via residential proxies and ...
RiskRubric provides a six-pillar framework to quantify AI model risk, guiding secure, compliant adoption with evidence-based ...
Regional analysis of BEC and VEC engagement, post-read behavior, and reporting gaps, highlighting the need for targeted ...
Overview of NIS2, CRA, and DORA status, implications, and compliance strategies for EU organizations and the financial sector ...
Identity security has officially overtaken all other risks as the top concern in cloud environments. According to CSA’s State of Cloud and AI Security 2025 survey report, insecure identities and risky ...
SEATTLE – June 12, 2025 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud ...
Why legacy access models fail, and how modern identity platforms are redefining third-party risk. As a long-time CISO and before that having led B2B and Third-Party Connectivity technology service ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results