资讯
CSA’s AI Safety Initiative is the premier coalition of trusted experts who converge to develop and deliver essential AI guidance and tools that empower organizations of all sizes to deploy AI ...
Understand the critical next steps to secure and manage your non-human identities (NHIs) effectively. Refine your strategy, ...
When it comes to executing identity processes, 96% of organizations still rely on manual workflows. Automation is the ...
Zero Trust is a strategic mindset that is highly useful for organizations to adopt as part of their digital transformations. Based on the idea of "never trust, always verify," the Zero Trust model ...
Why do organizations migrate to the public cloud? It may sound like a simple question in 2025, but there’s complexity to it. Hint: It isn’t about cost anymore.
Explore OWASP’s new NHI Top 10 list, designed to standardize non-human identity security and help teams manage these critical ...
CSA Chapters unite cloud security professionals worldwide, fostering collaboration, knowledge-sharing, and career growth. CSA Chapter connects you to a vibrant local and global community. Whether you ...
The AI Technology and Risk Committee is focused on staying abreast of the latest technological advancements in AI while simultaneously identifying, understanding, and forecasting associated risks, ...
Discover how deterministic AI empowers DevSecOps by automating secure, policy-aligned remediations and shifting from ...
This blog post presents MAESTRO (Multi-Agent Environment, Security, Threat, Risk, and Outcome), a novel threat modeling framework designed specifically for the unique challenges of Agentic AI. If you ...
The CAIQ is used by CSPs to submit to the CSA STAR Registry. The Consensus Assessments Initiative Questionnaire (CAIQ) v3.1. offers an industry-accepted way to document which security controls exist ...
CSA’s Top Threats to Cloud Computing Deep Dive 2025 reflects on eight recent real-world cybersecurity breaches. The report presents each incident as both a detailed narrative and as a threat model ...
一些您可能无法访问的结果已被隐去。
显示无法访问的结果