Actualités

QR codes promise convenience, but most people don’t realize the sheer ease with which those codes can be weaponized. Learn ...
Steer clear of the dangers of oversharing on social media. This blog offers examples of what can go wrong and easy-to-follow ...
This comprehensive glossary combines all the glossaries created by CSA Working Groups and research contributors into one place. If you have a question or need other assistance please reach out to ...
Learn how homoglyph attacks work, why they’re a growing concern for major brands, and how DNS Posture Management defends ...
As companies feel mounting pressure to document cybersecurity controls & demonstrate risk maturity, we are witnessing the ...
Several critical data governance and security vulnerabilities contributed to the 2023 Toyota data breach, including ...
This report provides case‌ ‌study‌ ‌analyses‌ ‌for‌ last year’s ‌ The‌ ‌Egregious‌ ‌11:‌ ‌Top‌ ‌Threats‌ ‌to‌ ‌Cloud‌ ‌Computing and a relative security industry breach analysis. Using nine actual ...
Deepfake audio fraud can mimic voices with alarming accuracy. Many organizations are ill-equipped to combat this ...
Cloud Security Alliance (CSA) offers certificates, trainings, and other educational opportunities for a range of cloud security related topics.
True IAM security starts with visibility—mapping identities, assessing risk, and turning insights into action to reduce ...
Learn what ISO 42001 is, what to expect from the certification process, and practical insights to help you lay a strong ...
CSA’s working groups develop best practices, research and tools for cloud security. Each group focuses on a unique topic or aspect of cloud security.