Learn about the Enterprise Authority to Operate Controls Framework, an assessment framework that targets small ...
Large Language Models bring significant security challenges. Explore how a proposed LLM Observability & Trust API can help ...
Stay ahead of non-human identity (NHI) attacks with insights from recent high-profile breaches. Learn how to secure your ...
For a holistic view of security, organizations must implement new cybersecurity workflows, automate manual processes, and ...
CSA’s Security Guidance v5 is here! Learn about the differences from v4, what’s included, and how it helps you achieve more ...
Effective Non-Human Identity Management (NHIM) is critical for securing modern digital ecosystems. Learn how to manage NHIs, ...
Learn about the Certificate of Cloud Security Knowledge (CCSK) v5. This cloud security training helps you and your team stay ...
The only way to truly protect sensitive, controlled, and private data is to fully encrypt it using the most advanced ...
Founded in 2013 by the Cloud Security Alliance, the Security Trust Assurance and Risk (STAR) registry encompasses key principles of transparency, rigorous auditing, and cloud security and privacy best ...
The Enterprise Resource Planning (ERP) working group seeks to develop best practices to enable organizations that run their business on large ERP implementations, such as SAP or Oracle applications, ...
Are you a research volunteer? Request to have your profile displayed on the website here.
Gain expertise in Zero Trust with CSA’s Certificate of Competence in Zero Trust (CCZT). Elevate your security skills and advance your career. Effectively address modern cloud security challenges with ...