News
Understand the critical next steps to secure and manage your non-human identities (NHIs) effectively. Refine your strategy, ...
Explore OWASP’s new NHI Top 10 list, designed to standardize non-human identity security and help teams manage these critical ...
When it comes to executing identity processes, 96% of organizations still rely on manual workflows. Automation is the ...
For years, DevSecOps has aimed to integrate security seamlessly into every phase of the software development lifecycle. Despite major advancements in tooling and cultural practices, one persistent ...
Starting the CSA Central America Chapter was one of the best decisions for my career. It gave me a platform to lead meaningful discussions on cloud security, connect with top industry experts, and ...
This document introduces Valid-AI-ted, CSA’s new AI-powered tool for evaluating STAR Level 1 self-assessments. Learn how the tool uses LLM technology to provide automated, actionable feedback, support ...
Written by Ken Huang, CSA Fellow, Co-Chair of CSA AI Safety Working Groups and Dr. Ying-Jung Chen, Georgia Institute of Technology. This implementation guide provides a comprehensive, hands-on ...
Written by Eyal Estrin. Why do organizations migrate to the public cloud? This blog post was written in 2025, and it may sound like a simple question, but let's dive into it. Historically: The Cost ...
Originally published by Aembit. Written by Apurva Davé. AI identity is not yet a fully formed concept. We have a concept of identity for humans (workforce and customers), and we have identity for ...
The Cloud Controls Matrix (CCM) is a framework of controls that are essential for cloud computing security. You can use CCM to systematically assess and guide the security of any cloud implementation.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results