News

Why do manual identity workflows continue to exist, when the consequences of getting them wrong are so serious and when ...
Traditional cybersecurity risk management is becoming ineffective. This survey report shows how data security risk assessment practices still need to change.
Email attacks on financial services rose 25% year-over-year. Learn why FinServ is a top target and how threat actors exploit trust to deceive employees.
Elevate your customer communications. Elixir’s revolutionary, cloud-native SaaS CCM Solution is set to change the CCM landscape. Break down silos, foster collaboration, and create personalized ...
A Commitment to Innovation and Care: How Houston Eye Is Building Cyber Resilience with Illumio. “Before Illumio, it was a matter of when, not if, a breach would happen,” Hornberger shared. “Now, if ...
This comprehensive glossary combines all the glossaries created by CSA Working Groups and research contributors into one place. If you have a question or need other assistance please reach out to ...
Security remediation involves identifying, evaluating, and addressing security vulnerabilities to mitigate potential risks. In the ever-evolving landscape of cybersecurity, this remains a critical ...
These organizations have signed the CSA AI Trustworthy Pledge, demonstrating their commitment to responsible AI development and deployment. Each signed organization has affirmed their alignment with ...
This mapping aims to identify the alignment between the AICM’s controls and the EU AI Act’s requirements, identifying areas of full, partial, or no coverage. Each control in the AICM is compared ...
This document is a CSA CCM v4.0 addendum to the CRI FS Profile v1.2 that contains controls mapping between the CCM and the FS Profile.
Learn why it's important to adopt a risk-based approach to AI governance. Learn how to address AI challenges, regulatory concerns, and concerns about AI ethics.
Learn the core concepts, best practices and recommendation for securing an organization on the cloud regardless of the provider or platform. Covering all 14 domains from the CSA Security Guidance v4, ...