Today’s Cloud Security Word of the Week is: Quantum Computing 🧑🏽💻! Quantum computing is an area of computer science that uses quantum mechanics to solve complex problems too difficult for current common computers and represents a huge leap forward in computational ability. With the advancement of quantum technologies and the growing list of solvable problems, governments, companies, and even regular users will soon be adopting quantum technologies into their everyday activities. Cory Missimore, Member of the CSA Quantum-Safe Security Working Group, dives into the funding, adoption, and value of quantum hardware: https://bit.ly/4eOsSWu #quantum #quantumcomputing
About us
The Cloud Security Alliance is a non-profit organization formed to promote the use of best practices for providing security assurance within Cloud Computing, and provide education on the uses of Cloud Computing to help secure all other forms of computing. The Cloud Security Alliance is comprised of many subject matter experts from a wide variety disciplines, united in our objectives: * Promote a common level of understanding between the consumers and providers of cloud computing regarding the necessary security requirements and attestation of assurance. * Promote independent research into best practices for cloud computing security. * Launch awareness campaigns and educational programs on the appropriate uses of cloud computing and cloud security solutions. * Create consensus lists of issues and guidance for cloud security assurance.
- Website
-
http://www.cloudsecurityalliance.org
External link for Cloud Security Alliance
- Industry
- Computer and Network Security
- Company size
- 51-200 employees
- Headquarters
- Seattle
- Type
- Nonprofit
- Founded
- 2008
Locations
-
Primary
Seattle, US
-
Employees at Cloud Security Alliance
Updates
-
Unlock your cloud security potential with the new and improved CCSK v5, launching on July 9th! Benefit from vendor-neutral insights on AI, Zero Trust, and more, gain actionable skills to tackle modern challenges, and learn from industry-leading experts. Buy your CCSK exam token before July 9, 2024, for just $395 and save $50! V4 tokens will upgrade to v5 automatically. Secure your token now → https://bit.ly/3VRfEQ2 #CCSKv5 #CloudSecKnowledge #CyberSecurity
-
The Cloud Security Alliance has just released the Enterprise Authority to Operate (EATO) Controls Framework, to help identify and mitigate risks in cloud-based services. With 163 comprehensive controls, it simplifies acceptance by large corporate clients, especially in highly regulated industries. Enhance your security, ease compliance, and attract more customers with EATO. Download Now → https://bit.ly/45W1dz6 #CloudSecurity #XaaS #EATO
-
-
Cybersecurity, like physical security, is built with the imperfections of humanity in mind. No amount of annual cyber hygiene or phishing awareness training is going to prevent people from making mistakes. So it’s time to focus resources on building a security program that takes human fallibility into account. The key techniques? MFA, user/app segmentation, and Zero Trust. Benjamin Corll, CISO in Residence at Zscaler, provides an overview of these techniques and why they’re so necessary → https://bit.ly/3L8SdNm #multifactorauthentication #zerotrust #cloudsecurity
-
-
🛡️ It’s time to get serious about security - and CSA has a ton of resources to help you out! (FYI these resources are still super helpful if you’re already serious about security 😉) The latest edition of the CSA Roundup newsletter compiles 13 articles all about addressing AI risks, assuring cloud provider security, implementing security best practices, and understanding application security. Don’t miss key articles that dive into security concerns around deepfakes; how to enhance your SOC 2 or ISO 27001 certification; and how to differentiate between CNAPP, CSPM, and ASPM. Check it out below! #aisecurity #riskmanagement #applicationsecurity #CNAPP #ASPM #CSPM
-
Our latest blog post dives into the fascinating journey of Ken Huang, CISSP, from early studies to groundbreaking contributions in the field of AI. Discover the top concerns surrounding AI security, with a deep dive into the dangers of deepfakes. Learn how these synthetic media challenge identity management and trust in digital content. Read More → https://bit.ly/3RPvOII #CSAI #AI #Deepfakes
AI Deepfake Security Concerns | CSA
cloudsecurityalliance.org
-
There are two cardinal conformance frameworks that guide CSA’s STAR program ⭐: SOC 2 and ISO 27001. Building upon their critical controls, STAR also accounts for the complexity of cloud environments, defines a clear scope of applicability, adds extra transparency, and breaks down the shared security responsibilities between customers and providers. Hear from CSA’s CEO Jim Reavis about how STAR elevates the other two standards → https://bit.ly/3VQoYDQ #compliance #soc2 #iso27001 #cloudsecurity
-
-
Our CSA chapters are at the forefront of creating a secure cyber world by engaging IT professionals in their communities. This week, we're highlighting the incredible efforts of some of our chapters. Don’t forget to tag us in your posts for a chance to be featured! Get Involved in a CSA Chapter → https://bit.ly/4ejkVbH #CloudSecurity #CSAChapters #CSATogether Dr. Philip Cao Moshe Ferber Dima Fomberg, CISSP Natalie Christmas Joye Purser CISSP PhD Anthony Bryant Jones
-
-
-
-
-
+2
-
-
Cloud Security Alliance reposted this
Webinar: Understanding Data Security & DevSecOps Date and Time: July 17, 2024, 11:00 AM PST Event Focus: Exploring the challenges and solutions in securing data within multicloud environments, particularly addressing the limitations of Cloud-Native Application Protection Platforms (CNAPP) and the rise of shadow data. Speakers: Terry Ray - SVP and CTO, Imperva Data Security Sumanth Kakaraparthi - VP of Product Management, Imperva Data Security Event Link: https://lnkd.in/eSn6zJhZ Key Topics to be Covered: 1. Cloud Security Posture vs. Data Posture: - Understanding that a strong cloud security posture does not automatically equate to a strong data posture. - Highlighting the difference between securing applications and securing the data within those applications. 2. Adopting CNAPP and its Limitations: - While CNAPPs are designed to protect cloud-native applications, they can leave data assets exposed. - The dynamic nature of cloud environments often leads to the creation of shadow data—hidden or untracked data repositories that are not secured adequately. 3. Challenges in Multicloud Environments: - Securing data across multiple cloud service providers (CSPs) introduces complexity and potential security gaps. - Ensuring full visibility and control over data across different platforms is a significant challenge. 4. Rise of Shadow Data: - Understanding how dynamic changes to data pipelines and services can create shadow data. - The risks associated with shadow data, including potential data breaches and compliance issues. 5. In-depth Observability and Analytics: - Leveraging observability to gain insights into data flows and data storage across multicloud environments. - Utilizing meaningful analytics to detect anomalies and potential security threats. 6. Data-Centric Protection Practices: - Implementing solid data protection practices to reduce data risk. - Focusing on a data-centric security approach to safeguard data at scale. - Addressing how organizations can protect sensitive data effectively while supporting business growth. Learning Objectives: - Identify the Shortcomings of CNAPP for Data Security: Recognize why traditional CNAPPs may not provide sufficient data security. - Understand the Complexity of Multicloud Security: Comprehend the challenges and solutions in securing data across multiple CSPs. - Leverage Observability and Analytics: Learn how in-depth observability and analytics can help in identifying and mitigating data risks. - Adopt a Data-Centric Security Approach: Discover best practices for adopting a data-centric approach to protect data at scale. Presented by: Cloud Security Alliance - CloudBytes #DataSecurity #DevSecOps #CloudSecurity #Multicloud #ShadowData #CNAPP #CyberSecurity #DataProtection #CloudNative #Observability #Analytics #SecurityPosture #CloudSecurityAlliance #Imperva #DataRisk #ITSecurity #CloudComputing #InfoSec
-
-
In our latest podcast episode, we chat with Anna Campbell Schorr, MBA, CCSK, Training Program Director at the Cloud Security Alliance (CSA). Anna discusses the groundbreaking Certificate of Competence in Zero Trust (CCZT), the industry's first authoritative training and certification program dedicated to Zero Trust architecture. Discover the development, significance, and impact of the CCZT program, and gain valuable insights on adopting Zero Trust principles to enhance your cybersecurity strategies. Listen Now → https://bit.ly/4ctXQlu #Cybersecurity #ZeroTrust #CCZT
From Concept to Competence: The Impact of CSA's Zero Trust Training - CSA Security Update
buzzsprout.com