ChaptersCircleEventsBlog
Join us for the in-person CCSK Azure course at Black Hat from August 4–5! Register now for a hands-on deep dive and secure your spot now!

Announcements

Announcements
Cloud Security Alliance VP: Database security boils down to these three things
Cloud Security Alliance VP: Database security boils down to these three things

The Register

March 30, 2023

News of Note: Building Bridges for Business and Beyond
News of Note: Building Bridges for Business and Beyond

What can be gained from meeting up with our cybersecurity friends?

March 30, 2023

Bell adds two cloud protection security services
Bell adds two cloud protection security services

Channel Daily News

March 29, 2023

Britive, which helps secure public clouds, lands $20.5M investment
Britive, which helps secure public clouds, lands $20.5M investment

TechCrunch

March 23, 2023

8 cloud detection and response use cases
8 cloud detection and response use cases

Tech Target

March 22, 2023

How ChatGPT Can Help and Hinder Data Center Cybersecurity
How ChatGPT Can Help and Hinder Data Center Cybersecurity

Data Center Knowledge

March 21, 2023

Why Zero Trust Is a Cybersecurity Journey and How To Realize Continuous Improvement
Why Zero Trust Is a Cybersecurity Journey and How To Realize Continuous Improvement

Acceleration Economy

March 17, 2023

How healthcare CISOs can automate cloud security controls
How healthcare CISOs can automate cloud security controls

Help Net Security

March 17, 2023

One-Third of Organizations Struggle With Data Loss Prevention Systems
One-Third of Organizations Struggle With Data Loss Prevention Systems

WebProNews

March 15, 2023

Data Loss Prevention and Data Security Survey Report | CSA (Cloud Security Alliance)
Data Loss Prevention and Data Security Survey Report | CSA (Cloud Security Alliance)

The CyberWire

March 14, 2023

Zero-trust approach shapes Dell's cybersecurity strategy for the enterprise
Zero-trust approach shapes Dell's cybersecurity strategy for the enterprise

SiliconANGLE

March 9, 2023

13 incident response best practices for your organization
13 incident response best practices for your organization

Tech Target

March 1, 2023

Looking Back at the Mega Breaches Trends of 2022
Looking Back at the Mega Breaches Trends of 2022

Infosecurity Magazine

March 1, 2023

Modernizing Assurance for Cloud and Beyond
Modernizing Assurance for Cloud and Beyond

Learn how CSA provides a standardized, universal approach to cloud assurance.

March 1, 2023

Cloud security startup Wiz, now valued at $10B, raises $300M
Cloud security startup Wiz, now valued at $10B, raises $300M

TechCrunch

February 27, 2023

Cloud incident response: Frameworks and best practices
Cloud incident response: Frameworks and best practices

Tech Target

February 24, 2023

Third-Party Risks: Challenges for MSSPs and How to Overcome Them
Third-Party Risks: Challenges for MSSPs and How to Overcome Them

MSSP Alert

February 24, 2023

Is cloud security automation really the future?
Is cloud security automation really the future?

Tech Monitor

February 22, 2023

Cybersecurity experts see uses and abuses in new wave of AI tech
Cybersecurity experts see uses and abuses in new wave of AI tech

Axios

February 17, 2023

CRA Cybersecurity Year in Review Report
CRA Cybersecurity Year in Review Report

Security Boulevard

February 15, 2023