News

Understand the critical next steps to secure and manage your non-human identities (NHIs) effectively. Refine your strategy, ...
When it comes to executing identity processes, 96% of organizations still rely on manual workflows. Automation is the ...
Explore OWASP’s new NHI Top 10 list, designed to standardize non-human identity security and help teams manage these critical ...
For years, DevSecOps has aimed to integrate security seamlessly into every phase of the software development lifecycle. Despite major advancements in tooling and cultural practices, one persistent ...
This CSA Data Security Glossary identifies and defines 127 terms relevant to data security. Based on the CSA Cloud Security Glossary, NIST Glossary, and other public sources, this compilation of data ...
CSA’s Top Threats to Cloud Computing Deep Dive 2025 reflects on eight recent real-world cybersecurity breaches. The report presents each incident as both a detailed narrative and as a threat model ...
Originally published by Valence. Written by John Filitz. Generative AI represents just one element of the broader SaaS revolution transforming enterprise IT. Most organizations are becoming SaaS-first ...
The Cloud Security Alliance (CSA), in collaboration with the MITRE Corporation, established the Cloud Adversarial Vectors, Exploits, and Threats (CAVEaT™) Working Group to develop, curate, and ...
A more effective approach to enterprise security is Zero Trust. This model assumes that you cannot trust any user or device by default. Understanding the practical application of Zero Trust in the ...
Written by Florent Paret, Reemo. The recent security incident involving BeyondTrust and the US Treasury Department, as reported by The Verge, serves as a stark reminder of some vulnerabilities in ...
Written by Eric Olden, Strata Identity. Originally published on Forbes. No group relies on reliability and predictability more than the military. Human lives and critical data depend on safe and ...