News

As telecom networks embrace cloud-native to power 5G, the importance of Zero Trust has never been greater. A recent ...
When it comes to executing identity processes, 96% of organizations still rely on manual workflows. Automation is the ...
Understand the critical next steps to secure and manage your non-human identities (NHIs) effectively. Refine your strategy, ...
This comprehensive glossary combines all the glossaries created by CSA Working Groups and research contributors into one place. If you have a question or need other assistance please reach out to ...
“The Treacherous 12 - Cloud Computing Top Threats in 2016” plays a crucial role in the CSA research ecosystem. The purpose of the report is to provide organizations with an up-to-date, expert-informed ...
Join a Worldwide Professional Network with CSA Chapters Build connections, grow your expertise, and shape the future of cloud security—locally and globally.
In cloud computing, multiple organizations are now managing the identity and access management to resources. Find best practices and resources for managing identity securely in the cloud.
Discover the 5 essential pillars of SaaS security to transform your organization's security posture and effectively manage decentralized SaaS environments.
Learn how the shared responsibility model is applied to security, governance, compliance, and BC/DR in cloud computing.
Get the comprehensive CCSK v5 Prep Kit. Includes study guide, sample questions, and more to help you pass the cloud security exam.
Cloud services adhere to a shared security responsibility model, which means both you and the provider maintain some responsibilities for security.