News
As telecom networks embrace cloud-native to power 5G, the importance of Zero Trust has never been greater. A recent ...
When it comes to executing identity processes, 96% of organizations still rely on manual workflows. Automation is the ...
Understand the critical next steps to secure and manage your non-human identities (NHIs) effectively. Refine your strategy, ...
SEATTLE – July 10, 2025 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud ...
Lands Tracker is the flagship platform from ICS, designed specifically for government agencies to manage public land and related assets across their full lifecycle. Configurable without code, Lands ...
This comprehensive glossary combines all the glossaries created by CSA Working Groups and research contributors into one place. If you have a question or need other assistance please reach out to ...
Join a Worldwide Professional Network with CSA Chapters Build connections, grow your expertise, and shape the future of cloud security—locally and globally.
Get a technical breakdown of the 2024 Snowflake data breach, including a description of the Advanced Persistent Threat and how the breach impacted the business.
Implement Zero Trust with five steps: assess assets, analyze dependencies, design policies, enforce access controls, and continuously monitor for evolving threats.
In cloud computing, multiple organizations are now managing the identity and access management to resources. Find best practices and resources for managing identity securely in the cloud.
The BeyondTrust & Treasury Department security incident serves as a stark reminder of the vulnerabilities in traditional bastion-style remote access solutions.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results