CSA Research Publications
Whitepapers, Reports and Other Resources
Browse Publications
![]() | Release Date: 03/11/2025 Shadow Access is undesired or unauthorized access to resources, such as applications, networks, and data. Shadow Access is increasingly a cloud issue, res... Request to download |
![]() | Zero Trust Guidance for Small and Medium Size Businesses (SMBs) - Japanese Translation Release Date: 02/11/2025 This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download |
![]() | AI Organizational Responsibilities: AI Tools and Applications Release Date: 01/28/2025 This publication is the third installment in a series that explores organizational responsibilities related to Artificial Intelligence (AI). The first pap... Request to download |
![]() | SaaS AI-Risk for Mid-Market Organizations Survey Report Release Date: 01/27/2025 Mid-market organizations are struggling to manage expanding Software as a Service (SaaS) environments. To better understand this challenge, Wing Security ... Request to download |
![]() | Zero Trust Guidance for Small and Medium Size Businesses (SMBs) Release Date: 01/13/2025 Cybersecurity for small businesses involves unique and heightened challenges. This makes the adoption of a Zero Trust strategy critical for safeguarding t... Request to download |
![]() | Map the Transaction Flows for Zero Trust Release Date: 11/18/2024 The NSTAC Report to the President on Zero Trust defines five steps to implementing a Zero Trust security strategy. This publication provides guidance on e... Request to download |
![]() | AI Risk Management: Thinking Beyond Regulatory Boundaries Release Date: 11/13/2024 While artificial intelligence (AI) offers tremendous benefits, it also introduces significant risks and challenges that remain unaddressed. A comprehensiv... Request to download |
![]() | AI Organizational Responsibilities - Governance, Risk Management, Compliance and Cultural Aspects Release Date: 10/21/2024 Continuing CSA's efforts to address the evolving AI landscape, this latest publication covers AI governance, risk management, and culture. Understand vari... Request to download |
![]() | AI in Medical Research: Applications & Considerations Release Date: 09/25/2024 The advent of artificial intelligence (AI) has brought about a paradigm shift in numerous fields. AI technologies can process vast amounts of data, recogn... Request to download |
![]() | Don’t Panic! Getting Real about AI Governance Release Date: 09/18/2024 The excitement around Generative AI and its potential business value continues to grow. A major factor is AI systems' emerging capability to mimic human-l... Request to download |
![]() | Fully Homomorphic Encryption Working Group Charter 2024 Release Date: 08/29/2024 Through the use and deployment of cryptographic libraries, specialist software toolchains, and dedicated hardware and infrastructure, Fully Homomorphic En... Request to download |
![]() | Using AI for Offensive Security Release Date: 08/06/2024 Offensive security involves proactively simulating an attacker’s behavior by using tactics and techniques similar to those of an adversary to identify sys... Request to download |
![]() | AI Model Risk Management Framework Release Date: 07/23/2024 Sophisticated machine learning (ML) models present exciting opportunities in fields such as predictive maintenance and smart supply chain management. Whil... Request to download |
![]() | Defining the Zero Trust Protect Surface Release Date: 03/05/2024 Enterprise adoption and implementation of Zero Trust is broad and growing. Venture Beat reports that 90% of organizations moving to the cloud are adopting... Request to download |
![]() | DLT Cybersecurity Maturity Core Framework v1.0 Release Date: 01/22/2024 The “DLT Risk Mitigation Model Tool” is designed to assist organizations in crafting a tailored risk mitigation strategy based on their unique risk appeti... Request to download |
![]() | Beyond Passwords: The Role of Passkeys in Modern Web Security Release Date: 11/12/2023 Web authentication methods have evolved significantly over the years to improve security and the user experience. In the early days of the internet, usern... Request to download |
![]() | Cloud Native Application Protection Platform Survey Report Release Date: 08/23/2023 Cloud Native Application Protection Platforms (CNAPPs) have emerged as a critical category of security tooling in recent years due to the complexity of co... Request to download |
![]() | How to Design a Secure Serverless Architecture (2023 Version) - Japanese Translation Release Date: 05/12/2023 This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download |
![]() | An Agile Data Doctrine for a Secure Data Lake Release Date: 04/25/2023 Data is now a significant asset in most organizations around the globe, whether government, business, or not-for-profit; the inevitable shift toward its u... Request to download |
![]() | Secure Connection Requirements of Hybrid Cloud - Japanese Translation Release Date: 06/14/2022 This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download |