ChaptersCircleEventsBlog
Join us for the in-person CCSK Azure course at Black Hat from August 4–5! Register now for a hands-on deep dive and secure your spot now!

Blog

Read the latest cloud security news, trends, and thought leadership from subject matter experts.
Industry Insights
Core Cloud
A Cybersecurity Expert's Perspective on the CrowdStrike Incident
Published: 08/09/2024
Cloud Assurance
ISO 27001: Auditing “Themes” in the 2022 Revision
Published: 08/09/2024
Core Cloud
Cloud Migration Simplified: SaaS Secrets and PAM Strategy
Published: 08/09/2024
Cloud Assurance
How to Scale Your GRC Program with Automation
Published: 08/08/2024
Core Cloud
Best Practices to Secure Data Access in Snowflake
Published: 08/08/2024
Future Cloud
Transforming Data Security: How AI and ML is Shaping the Next Generation of Data Security Tools
Published: 08/08/2024
Core Cloud
CSA Community Spotlight: Contributing Something Meaningful with Head of Security Partha Chakraborty
Published: 08/07/2024
Core Cloud
Navigating the Shadows: Safeguarding AI Infrastructure Amidst CVE-2023-48022
Published: 08/07/2024
Cloud Assurance
The Hydra Effect: Why Shutting Down RaaS is Like Playing Whack-a-Mole
Published: 08/07/2024
Cloud Assurance
The Top 7 Questions We Get Asked about CTEM
Published: 08/07/2024
Future Cloud
Imagine GRC in 2030: a Q&A with RegScale’s Travis Howerton
Published: 08/06/2024
Core Cloud
Accedere's Perspective on the CrowdStrike Incident
Published: 08/05/2024
Core Cloud
Surviving LockBit: Lessons from a Ransomware Attack
Published: 08/05/2024
Future Cloud
The Future of Cybersecurity Compliance: How AI is Leading the Way
Published: 08/05/2024
Future Cloud
The CCZT Program: Built for the Industry, By the Industry
Published: 08/02/2024
Core Cloud
Zooming In: 6 Ways Cybercriminals Use the Black Market to Steal Zoom User Data
Published: 08/01/2024
Core Cloud
Mitigating Risks During Mergers and Acquisitions in Healthcare with Security Testing
Published: 08/01/2024
Cloud Assurance
Breach Debrief: Snowflake MFA Meltdown Creates Data Leak Blizzard
Published: 07/31/2024
Core Cloud
How Time, Entitlements and Approvals (TEA) Can Secure the Keys to Your Cloud
Published: 07/31/2024
Cloud Assurance
The Danger of Sharing Files with “Anyone with the Link”: Examining a Risky Google Drive Misconfiguration
Published: 07/30/2024
Filter by Theme
Core Cloud

Core Cloud

Whether you have an established cloud security program or are starting your cloud migration, these blogs will help you enhance your cloud security strategy . Learn about cybersecurity threats, certification, and more.

Cloud Assurance

Cloud Assurance

Improve the security and compliance posture of your organization and leverage the controls inside of cloud assurance. Gain the guidance and tools to build your own cloud assurance ecosystem.

Future Cloud

Future Cloud

Leverage CSA to help your organization solve tomorrow's problems today. Explore innovative technologies and strategies through the topics of Zero Trust, Quantum, and more.

Browse by Topic
Unlock Cloud Security Insights

Unlock Cloud Security Insights

Choose the CSA newsletters that match your interests:

Subscribe to our newsletter for the latest expert trends and updates