News
CSA is moving toward a more streamlined community experience for joining working groups, connecting with local chapters, and engaging with training communities.
CISA released Microsegmentation in Zero Trust, Part One: Introduction and Planning as part of its ongoing efforts to support US Federal Civilian agencies implementing zero trust architectures (ZTAs).
CSA's AI Controls Matrix represents a paradigm shift in AI governance, providing the first comprehensive framework designed ...
QR codes promise convenience, but most people don’t realize the sheer ease with which those codes can be weaponized. Learn ...
QR codes promise convenience, but most people don’t realize the sheer ease with which those codes can be weaponized. Learn more about the new “quishing” threat.
Steer clear of the dangers of oversharing on social media. This blog offers examples of what can go wrong and easy-to-follow ...
Learn what e‑skimming is, why it’s so dangerous, how PCI DSS v4.x addresses it, and some of the options available to help you ...
Learn how homoglyph attacks work, why they’re a growing concern for major brands, and how DNS Posture Management defends ...
Walk through how to build a complete system using the Model Context Protocol (MCP), a framework designed to bridge the gap between LLMs and external tools.
Valid-AI-ted provides an automated quality check of STAR Level 1 self-assessments using state-of-the-art LLM technology SEATTLE – June 11, 2025 – The Cloud Security Alliance (CSA), the world’s leading ...
Explore how AI and data privacy are reshaping global business, driving innovation, and demanding agile, ethical governance across industries.
AI is revolutionizing how we detect and respond to threats, enhancing the capacity to protect sensitive data and systems from malicious actors.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results