Proactive communication, collaboration, and decisive action can turn a security breach into an opportunity for a stronger ...
In a Multi-Turn Attack, a malicious user starts with a benign AI prompt and gradually escalates it. Multi-Turn Attacks are ...
Customers are most comfortable sharing their data with banks. Why is this? Why do some industries enjoy a higher level of ...
CSA interviews one of Paperclip’s Compliance Officers about their contributions to CSA’s data security research and how the ...
A large-scale attack exploited insecure AWS-stored credentials, impacting over 230 million environments. Protect your NHIs with key tips for minimizing attack surfaces.
CSA's Cloud Trust Summit 2024 featured an expert panel discussion about v2 of our CCM v4.0 Implementation Guidelines. Led by CSA's Lefteris Skoutaris, the panelists included: David Skrdla, Senior IT ...
Is Your Production Data Secure? That’s a Hard NO. Originally published by Paperclip. Written by Mike Bridges. The culture of cybersecurity and data protection is broken. Let’s look at it from a unique ...
Written by Megan Theimer, Content Program Specialist, CSA. Has someone brought up the CSA STAR Program or the CSA Cloud Controls Matrix and you have no idea what that means? This blog is the place to ...
CSA Community Spotlight: Promoting Data Security Best Practices with Compliance Officer Rocco Alfonzetti, Jr. Written by Megan Theimer, Content Program Specialist, CSA. Today we’re chatting with Rocco ...