ChaptersCircleEventsBlog
Join us for the in-person CCSK Azure course at Black Hat from August 4–5! Register now for a hands-on deep dive and secure your spot now!

Announcements

Announcements
2024 to 2025: How GRC Trends are Reshaping the Industry
2024 to 2025: How GRC Trends are Reshaping the Industry

February 13, 2025

Top five tech trends of 2024 and their impact on the 2025 cyberthreat landscape
Top five tech trends of 2024 and their impact on the 2025 cyberthreat landscape

Positive Technologies

February 12, 2025

10 Fast Facts About Cybersecurity for Financial Services—And How ASPM Can Help
10 Fast Facts About Cybersecurity for Financial Services—And How ASPM Can Help

February 12, 2025

When Technology Isn’t the Problem: The Psychology of IT Transformation
When Technology Isn’t the Problem: The Psychology of IT Transformation

February 11, 2025

Learn about Cyber Resiliency in the Financial Industry
Learn about Cyber Resiliency in the Financial Industry

Featuring DTCC CISO Dr. Yonesy Núñez

February 10, 2025

Week in review: Exploited 7-Zip 0-day flaw, crypto-stealing malware found on App Store, Google Play
Week in review: Exploited 7-Zip 0-day flaw, crypto-stealing malware found on App Store, Google Play

HelpNet Security

February 9, 2025

Cybersecurity Snapshot: Cyber Agencies Offer Best Practices for Network Edge Security, While OWASP Ranks Top Risks of Non-Human Identities
Cybersecurity Snapshot: Cyber Agencies Offer Best Practices for Network Edge Security, While OWASP Ranks Top Risks of Non-Human Identities

Security Boulevard

February 7, 2025

Mid-market organizations struggling with SaaS security gaps
Mid-market organizations struggling with SaaS security gaps

SC Magazine

February 7, 2025

It’s Time to Split the CISO Role if We Are to Save It
It’s Time to Split the CISO Role if We Are to Save It

February 7, 2025

Cloud Security Alliance unveils new AI governance report
Cloud Security Alliance unveils new AI governance report

SecurityBrief UK

February 6, 2025

Seize the ‘Zero Moment of Trust’
Seize the ‘Zero Moment of Trust’

February 5, 2025

The Future of Compliance is Here: Automation, Intelligence, and a Shift to Proactive Security
The Future of Compliance is Here: Automation, Intelligence, and a Shift to Proactive Security

February 4, 2025

5 Questions to Ask a Potential Privileged Access Management Vendor
5 Questions to Ask a Potential Privileged Access Management Vendor

February 4, 2025

Cloud Security Org Weighs In on DeepSeek AI Just as Data Leakage Reported
Cloud Security Org Weighs In on DeepSeek AI Just as Data Leakage Reported

Virtualization Review

February 3, 2025

Only 3% of organizations have a dedicated budget for SaaS security
Only 3% of organizations have a dedicated budget for SaaS security

HelpNet Security

February 3, 2025

What To Expect from 2025's AI Agents: Cloud Security Alliance (CSA)
What To Expect from 2025's AI Agents: Cloud Security Alliance (CSA)

Converge360

February 3, 2025

Building Resiliency: Strategies for Compliance and Operational Excellence
Building Resiliency: Strategies for Compliance and Operational Excellence

February 3, 2025

Embracing Innovation Over the Status Quo
Embracing Innovation Over the Status Quo

February 3, 2025

Cybersecurity Snapshot: CSA Offers Tips for Deploying AI Securely, While Deloitte Says Cyber Teams’ GenAI Use Yields Top ROI
Cybersecurity Snapshot: CSA Offers Tips for Deploying AI Securely, While Deloitte Says Cyber Teams’ GenAI Use Yields Top ROI

Security Boulevard

January 31, 2025

CSA report aids mid-market firms in SaaS security strategy
CSA report aids mid-market firms in SaaS security strategy

Security Brief New Zealand

January 31, 2025