CSA Blog

  • Artificial Intelligence (AI) has become a cornerstone of innovation, transforming industries and reshaping how we interact with technology. At the heart of this revolution lies Large Language Models (LLMs)—AI systems designed to understand and generate human-like text.However, even...
  • Originally published by Truyo.Written by Dan Clarke.The European Union’s AI Act, which entered into force August 1, 2024, marks a historic milestone as the world’s first comprehensive regulation for artificial intelligence. This groundbreaking legislation, initially agreed upon in...
  • Written by Itzik Alvas, Entro.Secrets & Non-Human Identities (NHIs) security in hybrid cloud environments is a critical challenge in today’s IT landscape. Passwords, API keys, certificates, and tokens are not just digital assets; they are the lifeblood of your organization’s security...
  • Contributed by Softchoice.Written by Abel E. Molina, Principal Architect, Security, Microsoft.As we look ahead to 2025, the landscape of cyber threats is evolving at a rapid pace, posing significant challenges for businesses, governments, and individuals. As the first blog of the...
  • Originally published by Devoteam.Written by Kris Mandryk, Lead Consultant, Devoteam Belgium.The cybersecurity landscape is evolving with the arrival of the European Union’s NIS2 Directive and the Digital Operational Resilience Act DORA). These regulations elevate the standards for...
  • Originally published by Illumio on December 9, 2024.Written by Raghu Nandakumara, Head of Industry Solutions, Illumio.Last month, I attended the Illumio World Tour stops in New York City and Sydney as well as Black Hat MEA. One topic dominated conversations: generative AI (GenAI...
  • Originally published by InsiderSecurity.This article kicks off a series that explores prominent cybersecurity incidents, using CSA’s Top Threats to Cloud Computing report as a foundation. In this installment, we analyze the LastPass hack, offering a user-friendly, illustrated breakdown...
  • Originally published by Schellman.Written by Avani Desai, CEO, Schellman.Even as AI systems become more advanced and enmeshed in daily operations, concerns regarding whether large language models (LLMs) are generating accurate and true information remain paramount throughout the...
  • Written by Jordi Vilanova, Cloudtango.In early 2024, T-Mobile experienced a significant data breach where attackers exploited weak IAM controls to gain access to the personal information of over 30 million customers. The attackers used a combination of phishing attacks and stolen...
  • Originally published by Vanta.Written by Jess Munday.If your business entails collecting and/or processing the personal data of European Union (EU) or United Kingdom (UK) citizens, complying with the General Data Protection Regulation (GDPR) is a priority.‍The regulation is quite...
  • Written by Rahul Kalva.Abstract As the cyber threat landscape evolves, leveraging Artificial Intelligence (AI) has become imperative for creating robust, proactive defenses. AI's ability to detect, predict, and respond to threats in real-time sets it apart as a transformative force...
  • Originally published by Tenable. Written by Gad Rosenthal. The rapid shift to cloud computing has transformed how organizations manage and store their data. But as cloud adoption has grown, the risks have been heightened as well. Seeing opportunity, cybercriminals are increasingly...
  • Originally published by Reemo.Written by Florent Paret.In today's digital landscape, marked by a proliferation of increasingly sophisticated cyberattacks, secure remote access to information systems has become a top priority. Protocol break, a technique that involves isolating systems...
  • Originally published by BARR Advisory.Expanding into the U.S. market offers Europe-based cloud service providers (CSPs) exciting new growth opportunities—but cybersecurity standards aren’t exactly the same across the pond. For security leaders who are used to GDPR and other European...
  • Written by Rajesh Awasthi, VP & Global Head of Managed Hosting and Cloud Services, Tata Communications.Originally published by DQ India.Cloud computing has transformed business operations with its scalability, flexibility, and cost-efficiency, encouraging organisations to modernise...