ChaptersCircleEventsBlog
Join us for the in-person CCSK Azure course at Black Hat from August 4–5! Register now for a hands-on deep dive and secure your spot now!

Announcements

Announcements
Cybercriminals hunting for leaks of personal data surges over holidays
Cybercriminals hunting for leaks of personal data surges over holidays

Consumer Affairs

December 4, 2024

Successfully Governing AI with Ken Huang
Successfully Governing AI with Ken Huang

TechStrong TV

December 4, 2024

The Future of AI Software Development
The Future of AI Software Development

Resilient Cyber Newsletter

December 3, 2024

Has PKI become the tacky bellbottoms in your IT closet? Refresh it with crypto agility
Has PKI become the tacky bellbottoms in your IT closet? Refresh it with crypto agility

Fast Company

December 2, 2024

The Cost of Cloud Misconfigurations: Preventing the Silent Threat
The Cost of Cloud Misconfigurations: Preventing the Silent Threat

Information Week

December 2, 2024

Artificial Intelligence Isn't a Silver Bullet
Artificial Intelligence Isn't a Silver Bullet

Cyber Defense Magazine

December 2, 2024

Ransomware Groups Targeting VPNs for Initial Access: Report
Ransomware Groups Targeting VPNs for Initial Access: Report

MSSP Alert

November 27, 2024

2025's CISO: Managing Cyber Threats With Bigger Budgets But Higher Stakes
2025's CISO: Managing Cyber Threats With Bigger Budgets But Higher Stakes

TripWire

November 26, 2024

IAM within the framework of defence in depth
IAM within the framework of defence in depth

Computer Weekly

November 25, 2024

5 Tech Essentials to Boost Efficiency in Financial Services
5 Tech Essentials to Boost Efficiency in Financial Services

BizTech Magazine

November 25, 2024

Cloud Security Alliance Report Offers Framework for Trustworthy AI
Cloud Security Alliance Report Offers Framework for Trustworthy AI

The Journal

November 20, 2024

New guidelines released for AI auditing by Cloud Security Alliance
New guidelines released for AI auditing by Cloud Security Alliance

IT Brief Asia

November 19, 2024

Future-Proofing Enterprise IT with Multi-Cloud
Future-Proofing Enterprise IT with Multi-Cloud

The Fast Mode

November 19, 2024

Introducing Third-Party Access Control: Protecting Cloud Resources Like Never Before
Introducing Third-Party Access Control: Protecting Cloud Resources Like Never Before

Security Boulevard

November 19, 2024

Map the Transaction Flows for Zero Trust
Map the Transaction Flows for Zero Trust

November 19, 2024

https://securityboulevard.com/2024/11/cybersecurity-snapshot-five-eyes-rank-2023s-most-frequently-exploited-cves-while-csa-publishes-framework-for-ai-system-audits/
https://securityboulevard.com/2024/11/cybersecurity-snapshot-five-eyes-rank-2023s-most-frequently-exploited-cves-while-csa-publishes-framework-for-ai-system-audits/

Security Boulevard

November 15, 2024

How resilient is your organisation against a cyberattack?
How resilient is your organisation against a cyberattack?

IT-Online

November 14, 2024

Cloud Security Alliance issues comprehensive guidelines for auditing AI systems
Cloud Security Alliance issues comprehensive guidelines for auditing AI systems

Security InfoWatch

November 14, 2024

Exploring the Power of AI in Software Development - Part 12: More Recommendations
Exploring the Power of AI in Software Development - Part 12: More Recommendations

DevOps Digest

November 13, 2024

Using Asymmetric Cryptography to Help Achieve Zero Trust Objectives
Using Asymmetric Cryptography to Help Achieve Zero Trust Objectives

November 13, 2024