DeepSeek AI’s newest model exceeds the capabilities of industry leaders, at much less cost. It’s time to reassess what it ...
Daniele Catteddu, CTO at CSA, discusses current GenAI governance, trust, risk management, and compliance challenges and ...
The EU AI Act strikes a balance between AI innovation & safety. It establishes clear guidelines for risk management, ongoing ...
We're drowning in compliance requirements while struggling to show real security improvement. CSA’s CEO Jim Reavis shares an initiative addressing this problem.
If you’re building a zero trust architecture, microsegmentation should be a crucial part of your plan. Here are the 10 things ...
CSA EMEA Congress 2019 TBD June 3, 2019 Download presentations CSA Colorado Chapter Forum 2019 TBD June 3, 2019 Download presentations CSA Summit at (ISC)² Security Congress 2019 TBD June 3, 2019 ...
An IEEE standard for local and metropolitan area networks–Port-Based Network Access Control. IEEE 802 LANs are deployed in networks that convey or provide access to critical data, that support mission ...
Understand why you need to look beyond your internal security practices. Define third-party risk management and realize its ...
Since 2012, Michael Roza has been a pivotal member of the Cloud Security Alliance (CSA) family. He has contributed to over 125 projects, as a Lead Author or Author/Contributor and many more as a ...
Written by Apurva Davé, Chief Marketing Officer, Aembit. We recently released one of the first comprehensive surveys of non-human identity (NHI) perceptions across security, developer, and DevOps ...
Remote Browser Isolation (RBI) secures access to web applications and content on personal devices, strengthening Bring Your ...
Finding the right Privileged Access Management (PAM) solution is critical. Here are 5 questions that will help you find a ...