Explores how AI agents retrieve data with user permissions yet expose outputs to mixed audiences, urging audience-aware authorization.
Overview of cloud security architecture, its core principles, components, and proactive strategies to protect data and ensure business continuity.
Explains SSCF adoption to unify SaaS security, outlining benefits for CISOs and product managers and upcoming implementation and audit guidelines.
Explores modern, modular data architectures for SecOps, moving beyond legacy SIEMs to reduce costs while improving visibility ...
Anthropic's Mythos Preview and Glasswing spark a defense view on patching, inventory, segmentation, and Zero Trust—with practical steps to harden systems now.
Threat & Vulnerability Management has undergone significant rework in CSA STAR v4.1. A new focus on threat modeling and risk ...
Guidance for CSA members on deploying post-quantum crypto in cloud-native zero-trust architectures, with priorities, ...
Discover the reality of autonomous AI risks. Learn about emerging shadow AI agents and the frequency of AI agent-related security incidents.
A practical checklist to secure AI agents within enterprise identity frameworks—authentication, authorization, token vaulting ...
Thales report shows AI can boost security only when data visibility and governance foundations are in place for unstructured data.
SANS Institute, Cloud Security Alliance, [un]prompted, and OWASP GenAI Security Project Release Emergency Strategy Briefing as AI-Driven Vulnerability Discovery Compresses Exploit Timelines from Weeks ...
This publication provides guidance for small and medium-sized businesses (SMBs) transitioning to a Zero Trust architecture. It takes into account the many unique constraints that SMBs face, including ...