ChaptersCircleEventsBlog
Join us for the in-person CCSK Azure course at Black Hat from August 4–5! Register now for a hands-on deep dive and secure your spot now!

Announcements

Announcements
The Importance of Standards in the IT Security Industry
The Importance of Standards in the IT Security Industry

Kuppinger Cole

September 12, 2022

GRU-backed cyberattacks: What they are, how to defend against them
GRU-backed cyberattacks: What they are, how to defend against them

SC Magazine

September 9, 2022

3 ways to fight cloud sprawl
3 ways to fight cloud sprawl

Security Magazine

September 6, 2022

How Secure Is Microsoft Teams? – UC Today
How Secure Is Microsoft Teams? – UC Today

Inferse

September 5, 2022

Today's threats, tomorrow's skill sets?
Today's threats, tomorrow's skill sets?

Teiss

August 30, 2022

Securing identities in the cloud: two new studies reveal the state of play
Securing identities in the cloud: two new studies reveal the state of play

List23

August 29, 2022

Securing identities in the cloud: 2 new studies give us the state of play
Securing identities in the cloud: 2 new studies give us the state of play

Venture Beat

August 29, 2022

Week in review: RCE bug in GitLab patched, phishing PyPI users, Escanor malware in MS Office docs: How vulnerable supply chains threaten cloud security
Week in review: RCE bug in GitLab patched, phishing PyPI users, Escanor malware in MS Office docs: How vulnerable supply chains threaten cloud security

HelpNet Security

August 28, 2022

Regulatory Implications from 2019 Capital One Hack and Recent Conviction of Former AWS Engineer
Regulatory Implications from 2019 Capital One Hack and Recent Conviction of Former AWS Engineer

JD Supra

August 26, 2022

How DevSecOps Empowers Citizen Developers
How DevSecOps Empowers Citizen Developers

Dark Reading

August 26, 2022

Critical Cloud Security Training at the Micro Level
Critical Cloud Security Training at the Micro Level

Fit in some cloud security training with CSA’s new micro-training courses.

August 23, 2022

SECtember Week: CxO Talks, Education, Table Top Exercise and More
SECtember Week: CxO Talks, Education, Table Top Exercise and More

Learn more about the agenda and speakers for SECtember 2022.

August 23, 2022

Zero-Trust: How SOC 2 Compliance Can Help
Zero-Trust: How SOC 2 Compliance Can Help

Security Boulevard

August 23, 2022

Facing the New Security Challenges That Come With Cloud
Facing the New Security Challenges That Come With Cloud

Dark Reading

August 23, 2022

IT Pros Trust Open Frameworks and Clouds Over Third Parties
IT Pros Trust Open Frameworks and Clouds Over Third Parties

The New Stack

August 22, 2022

The use of outdated infrastructure hinders the ability of organizations to protect their employees
The use of outdated infrastructure hinders the ability of organizations to protect their employees

NewsDubai

August 20, 2022

Cloud-based breaches primarily affected third parties and suppliers in 2021
Cloud-based breaches primarily affected third parties and suppliers in 2021

Techx

August 20, 2022

Organisations struggling to secure new cloud environments
Organisations struggling to secure new cloud environments

SecurityBrief Australia

August 19, 2022

Cloud security: Increased concern about risks from partners, suppliers
Cloud security: Increased concern about risks from partners, suppliers

Venture Beat

August 19, 2022

Companies struggling to secure cloud environments
Companies struggling to secure cloud environments

NewsDubai

August 19, 2022