News

Understand what happened in the Oracle Cloud Infrastructure (OCI) breach and potential mitigation strategies powered by ...
Zero Trust isn't enough in 2025. Explore the next wave of cloud security with AI, XDR, decentralized identity, and adaptive ...
Explore why training is essential and what specific areas should be covered to ensure compliance with the White House ...
Explore how combining SOC 2 and HIPAA compliance enhances data security, builds trust, and streamlines operations in the ...
The Cloud Security Alliance’s CFO encourages others beginning on their AI journeys to continue forging a path into this ...
Founded in 2013 by the Cloud Security Alliance, the Security Trust Assurance and Risk (STAR) registry encompasses key principles of transparency, rigorous auditing, and cloud security and privacy best ...
Founded in 2013 by the Cloud Security Alliance, the Security Trust Assurance and Risk (STAR) registry encompasses key principles of transparency, rigorous auditing, and cloud security and privacy best ...
There is a reason that a compromise of one smartphone doesn’t lead to a breach of every smartphone’s security: microsegmentation. Telecom companies use this ‘network of one’ strategy to isolate ...