ChaptersCircleEventsBlog

Download Publication

Deconstructing Application Connectivity Challenges in a Complex Cloud Environment
Deconstructing Application Connectivity Challenges in a Complex Cloud Environment

Deconstructing Application Connectivity Challenges in a Complex Cloud Environment

Release Date: 12/14/2022

The production and use of SaaS applications in organizations has grown exponentially over the past several years. Application Security has become an integral part of many organizations' security strategies. However, there are still many pain points organizations face with application connectivity security and risk management.

Download this Resource

Bookmark
Share
Related resources

Sponsor

State of SaaS Security Report 2025
State of SaaS Security Report 2025
Requirements for Bodies Providing STAR Certification
Requirements for Bodies Providing STAR Certific...
NIST CSF v2 Cloud Community Profile - Based on CCM v4
NIST CSF v2 Cloud Community Profile - Based on ...
Navigating the FedRAMP Evolution: How CSA CCM Provides a Solid Foundation
Navigating the FedRAMP Evolution: How CSA CCM Provides a Solid Foun...
Published: 04/03/2025
The Shift to Risk-Based Data Security Posture Management
The Shift to Risk-Based Data Security Posture Management
Published: 03/03/2025
Can GenAI Services Be Trusted? | At the Discovery of STAR for AI
Can GenAI Services Be Trusted? | At the Discovery of STAR for AI
Published: 01/29/2025
The Compliance Automation Revolution: Time for Real Change
The Compliance Automation Revolution: Time for Real Change
Published: 01/28/2025

Acknowledgements

Josh Buker
Josh Buker
Research Analyst, CSA

Josh Buker

Research Analyst, CSA

Ryan Gifford
Ryan Gifford
Research Analyst, CSA

Ryan Gifford

Research Analyst, CSA

Frank Guanco
Frank Guanco
Operations Director, CSA

Frank Guanco

Operations Director, CSA

Sean Heide
Sean Heide

Sean Heide

Alex Kaluza
Alex Kaluza
Research Analyst, CSA

Alex Kaluza

Research Analyst, CSA

John Yeoh
John Yeoh
Global Vice President of Research, CSA

John Yeoh

Global Vice President of Research, CSA

With over 15 years of experience in research and technology, John excels at executive-level leadership, relationship management, and strategy development. He is a published author, technologist, and researcher with areas of expertise in cybersecurity, cloud computing, information security, and next generation technology (IoT, Big Data, SecaaS, Quantum). John specializes in risk management, third party assessment, GRC, data protection, incid...

Read more

Hillary Baron
Hillary Baron
Senior Technical Director - Research, CSA

Hillary Baron

Senior Technical Director - Research, CSA

Are you a research volunteer? Request to have your profile displayed on the website here.

Related Certificates & Training