Learn about CISO Alex Getsin’s contributions to CSA Research, including the Top Threats series, and why he continues to stay ...
Get an overview of the major challenges that the Common Vulnerabilities and Exposures (CVE) program faces in today’s ...
Originally published by BARR Advisory. Artificial intelligence (AI) is transforming the way businesses operate across ...
Learn about Pete Chronis’ multifaceted involvement with CSA and how he sees CSA contributing to the future of cloud and ...
As many of you have read my past blogs, I like to quote individuals who have had experience in certain subjects. Although the ...
Privileged access management vendors are claiming they can provide access with zero standing privileges (ZSP). Dig into some ...
For those who want to learn from the industry's first benchmark for measuring Zero Trust skill sets, the CCZT includes foundational Zero Trust components released by CISA and NIST, innovative work in ...
Ashish Mehta has extensive experience in cybersecurity, blockchain, web development, IT management, financial markets, and the energy industry. He currently serves as Co-Chair of the Blockchain ...
Gartner has identified a comprehensive action plan for managing & securing unstructured data. Here are 9 actionable data ...
With over 15 years of experience in research and technology, John excels at executive-level leadership, relationship management, and strategy development. He is a published author, technologist, and ...
Since 2012 Michael has contributed to over 100 CSA projects completed by CSA's Internet of Things, Zero Trust/Software-Defined Perimeter, Top Threats, Cloud Control Matrix, Containers/Microservices, ...
Traditional IGA solutions and group-based permissions lead to privilege sprawl and security risks in dynamic cloud ...