News

CSA’s Enterprise Authority to Operate (EATO) framework and auditing guidelines are specifically designed to fulfill stringent ...
When AI fails, it often fails fast and loud. Apply CSA’s AI Resilience Benchmarking Model to 4 real incidents to get a better ...
Learn how to evaluate transparency, risks, scalability, and ethical considerations to make informed cybersecurity decisions ...
Explore how the NIST Cybersecurity Framework (CSF) 2.0 offers organizations a structured path to building cyber resilience in ...
Written by Chris Payne, Principal Product & Solutions Marketing Manager for Axway MFT. There’s an old IT saying that nobody notices MFT until something goes wrong. MFT hums along in the background at ...
The Cloud Controls Matrix (CCM) is a framework of controls that are essential for cloud computing security. It is created and updated by CSA and aligned to CSA best practices. You can use CCM to ...
Written by Amardip Deshpande, Senior Security Researcher at CheckRed. Cyberattacks on critical infrastructure have become a growing concern, with sectors like water supply, energy, and other essential ...
Founded in 2013 by the Cloud Security Alliance, the Security Trust Assurance and Risk (STAR) registry encompasses key principles of transparency, rigorous auditing, and cloud security and privacy best ...
Founded in 2013 by the Cloud Security Alliance, the Security Trust Assurance and Risk (STAR) registry encompasses key principles of transparency, rigorous auditing, and cloud security and privacy best ...
Trust is critical to the success of every business. And in 2024, we saw that building, scaling, and demonstrating trust is getting more difficult for organizations. Vanta’s second annual State of ...
Zero Trust security models are designed to eliminate implicit trust and enforce strict, continuous verification across users, devices, networks, applications, and data. However, one foundational ...