ChaptersCircleEventsBlog
Join us for the in-person CCSK Azure course at Black Hat from August 4–5! Register now for a hands-on deep dive and secure your spot now!

Announcements

Announcements
How to Surmount Hybrid Cloud's Biggest Security Challenges
How to Surmount Hybrid Cloud's Biggest Security Challenges

BizTech Magazine

August 23, 2023

5 Essential Steps For Stronger Cloud Security Using MITRE ATT&CK And D3FEND
5 Essential Steps For Stronger Cloud Security Using MITRE ATT&CK And D3FEND

Security Boulevard

August 22, 2023

Leveraging Cloud Computing For Nigeria's Economic Prosperity
Leveraging Cloud Computing For Nigeria's Economic Prosperity

Leadership News

August 21, 2023

How to conduct a cloud security assessment
How to conduct a cloud security assessment

TechTarget

August 19, 2023

Communicating the Business Value of Zero Trust
Communicating the Business Value of Zero Trust

This document equips InfoSec pros to effectively communicate the benefits of Zero Trust to internal stakeholders. ...

August 15, 2023

The Week Ahead: NIST post-quantum cryptography workshop; CISA officials discuss zero trust at Cloud Security Alliance event
The Week Ahead: NIST post-quantum cryptography workshop; CISA officials discuss zero trust at Cloud Security Alliance event

Inside Cybersecurity

August 14, 2023

FedRAMP and Federal Cybersecurity Market Roundup August 2023
FedRAMP and Federal Cybersecurity Market Roundup August 2023

Security Boulevard

August 10, 2023

SSPM to the Rescue: Accelerating SaaS Incident Response by 90%
SSPM to the Rescue: Accelerating SaaS Incident Response by 90%

Security Boulevard

August 10, 2023

New IAM Research by Stack Identity Finds Machine Identities Dominate Shadow Access in the Cloud, Revealing Easy Attack Vector for Hackers
New IAM Research by Stack Identity Finds Machine Identities Dominate Shadow Access in the Cloud, Revealing Easy Attack Vector for Hackers

Business Standard

August 9, 2023

Securing The Future: Embracing Cloud-Centric Cybersecurity Strategies
Securing The Future: Embracing Cloud-Centric Cybersecurity Strategies

Forbes

August 8, 2023

ISMG Editors: Financial Services Special
ISMG Editors: Financial Services Special

BankInfo Security

August 4, 2023

C-suite, rank-and-file at odds over security's role
C-suite, rank-and-file at odds over security's role

CIO Dive

August 3, 2023

71% of organizations are using a multi-cloud environment
71% of organizations are using a multi-cloud environment

Security Magazine

August 3, 2023

Cloud Security Alliance Research Reveals Relationship between Security and Innovation
Cloud Security Alliance Research Reveals Relationship between Security and Innovation

StreetInsider

August 3, 2023

A Guide to Preventing Data Loss in Cloud Computing
A Guide to Preventing Data Loss in Cloud Computing

Security Boulevard

August 2, 2023

Open-source security challenges and complexities
Open-source security challenges and complexities

Help Net Security

July 31, 2023

Around the Horn with a Cybersecurity Summer
Around the Horn with a Cybersecurity Summer

CSA’s CEO reflects on Gen AI and...

July 26, 2023

Startups’ Guide to Security Questionnaires
Startups’ Guide to Security Questionnaires

Security Boulevard

July 21, 2023

Zero Trust Guiding Principles
Zero Trust Guiding Principles

This document provides a clear understanding of what Zero Trust security is and the guiding principles that any or...

July 19, 2023

Emerging Trends in Cybersecurity and Data Privacy
Emerging Trends in Cybersecurity and Data Privacy

NewsTrack

July 14, 2023