Are zero-knowledge proofs used in machine learning at all? This blog post answers this question and explores the potential ...
Governing scanner adoption in DevSecOps involves strategic hooks and governance. Explore best practices for each stage of the ...
AI experts for every industry agree: if you had to choose just one thing to improve your AI security posture, then do Red ...
Enterprises are overhauling their cybersecurity strategies to combat rising cyber threats. Learn how integrated approaches ...
IAM ensures individuals access only the resources they are authorized to by verifying their identity and managing their roles ...
Recent CSA survey data shows that organizations are struggling to manage permissions and API keys. (API keys are the codes ...
Founded in 2013 by the Cloud Security Alliance, the Security Trust Assurance and Risk (STAR) registry encompasses key principles of transparency, rigorous auditing, and cloud security and privacy best ...
Since 2012 Michael has contributed to over 100 CSA projects completed by CSA's Internet of Things, Zero Trust/Software-Defined Perimeter, Top Threats, Cloud Control Matrix, Containers/Microservices, ...
For those who want to learn from the industry's first benchmark for measuring Zero Trust skill sets, the CCZT includes foundational Zero Trust components released by CISA and NIST, innovative work in ...
Anyone can join a working group, whether you have years of experience or want to just participate as a fly on the wall. The time commitment for this group varies depending on the project. You can ...