ChaptersCircleEventsBlog
Join us for the in-person CCSK Azure course at Black Hat from August 4–5! Register now for a hands-on deep dive and secure your spot now!

Announcements

Announcements
CSA identifies top 11 cloud security impediments
CSA identifies top 11 cloud security impediments

Barracuda

July 20, 2022

Public cloud customers concerned about security challenges - Study
Public cloud customers concerned about security challenges - Study

Teiss

July 19, 2022

Public Cloud Customers Admit Security Challenges
Public Cloud Customers Admit Security Challenges

Infosecurity Magazine

July 18, 2022

Key factors to achieve data security in cloud computing
Key factors to achieve data security in cloud computing

Tech Target

July 18, 2022

ChannelPro Weekly #232
ChannelPro Weekly #232

ChannelPro

July 16, 2022

Critical Infrastructure Operators Implementing Zero Trust in OT Environments
Critical Infrastructure Operators Implementing Zero Trust in OT Environments

Security Week

July 15, 2022

SecOps vs. CloudSecOps: What does a CloudSecOps team do?
SecOps vs. CloudSecOps: What does a CloudSecOps team do?

Tech Target

July 14, 2022

Organizations not confident they can protect sensitive data in the public cloud
Organizations not confident they can protect sensitive data in the public cloud

SC Media

July 13, 2022

Daily Briefing V11 Issue 133
Daily Briefing V11 Issue 133

The CyberWire

July 13, 2022

Building A Strong Cloud Security Posture
Building A Strong Cloud Security Posture

Forbes

July 12, 2022

How Confidential Computing Locks Down Data, Regardless of Its State
How Confidential Computing Locks Down Data, Regardless of Its State

Dark Reading

July 12, 2022

CSA announces the launch of their Zero Trust Advancement Center and how it can help play a role in protecting IoT, IIoT and ICS systems, Podcast
CSA announces the launch of their Zero Trust Advancement Center and how it can help play a role in protecting IoT, IIoT and ICS systems, Podcast

Telecom Reseller

July 12, 2022

Hacking the cloud: why APIs are now a top threat
Hacking the cloud: why APIs are now a top threat

IDG

July 11, 2022

The History and Evolution of Zero Trust
The History and Evolution of Zero Trust

SecurityWeek

July 11, 2022

3 Access Security Lessons Learned from the Marriott Data Breach
3 Access Security Lessons Learned from the Marriott Data Breach

Security Boulevard

July 10, 2022

Threats, Misconfigurations, Zero Trust and More - We’ve Got You Covered
Threats, Misconfigurations, Zero Trust and More - We’ve Got You Covered

Here’s a summary of the research and initiatives that CSA launched during RSAC.

July 5, 2022

Zero Trust Progress
Zero Trust Progress

Despite the popularity of Zero Trust, there is still confusion about what it is.

July 5, 2022

11 top cloud security threats
11 top cloud security threats

CSO Online

July 5, 2022

John Kindervag joins Cloud Security Alliance as Security Advisor
John Kindervag joins Cloud Security Alliance as Security Advisor

IT Security News

July 3, 2022

Quantum hacking is the next big cybersecurity threat. Here’s how companies should prepare for ‘Y2Q’
Quantum hacking is the next big cybersecurity threat. Here’s how companies should prepare for ‘Y2Q’

Yahoo!Finance

July 1, 2022