CSA Blog

  • Originally published by Reco.Written by Gal Nakash. In this blog post, we'll explore a real-world use case involving a SaaS Threat Detection module and its revelation of a common threat within Office 365: disabled users retaining access to sensitive company data. Disabled users can...
  • Originally published by CyberGuard Compliance. In the early days of the COVID-19 pandemic, the Department of Health and Human Services’ Office for Civil Rights (OCR) issued a Notification of Enforcement Discretion which announced that the OCR would would be exercising it enforcement...
  • Originally published by Britive. Businesses rely more today than ever before on cloud-based services and multi-cloud infrastructures to power their operations. Managing identity and access across these diverse environments can be challenging, and that’s where Identity as a Service...
  • Originally published by CXO REvolutionaries.When an attacker scans your environment for entryways, what’s the most promising vulnerability they will discover?Verizon's 2023 Data Breach Investigations Report found that over 74% of breaches required human exploitation to be successful...
  • Originally published by Astrix. According to Gartner: “Software supply chain attacks have added a new dimension to software security problems because the software delivery pipelines and the tools used to build and deploy software are the new attack vectors.” While the software supply...
  • Originally published by Schellman.The regulation and responsible use of artificial intelligence (AI) has been a hot topic of 2023, prompting the release of NIST’s AI Risk Management Framework to help organizations secure this emerging tech. More standards are on the way that will...
  • Originally published by CrowdStrike. Access brokers are decking the halls with advanced social engineering scams and vulnerability exploits to blend in with normal users and make a quick profit by selling credentials and other access methods.The holiday season brings a shift in how...
  • Originally published by CyberGuard Compliance.AI has the potential to greatly enhance cybersecurity capabilities, but it also introduces new concerns and challenges. Here are some of the key AI-related cybersecurity concerns:Adversarial Attacks: Malicious actors can use AI to craft...
  • Cloud computing is a model for enabling on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal effort. A cloud can consist of nearly any computing resources, ranging from processors and memory to networks...
  • The Certificate of Competence in Zero Trust (CCZT) is the first vendor-neutral credential available for industry professionals to demonstrate their expertise in Zero Trust principles. The certificate provides an in-depth understanding of Zero Trust architecture, drivers, benefits...
  • Originally published by Uptycs. Written by Dan Verton. Kubernetes security may not be part of the everyday interactions of non-technical business leaders, but it directly affects their responsibilities and the organization’s overall health. The security risks associated with Kubernetes...
  • Originally published by Dazz. Written by Noah Simon, Head of Product Marketing, Dazz. For years, companies have been solving Shadow IT - the use of software, hardware, or SaaS services without the knowledge or approval of the IT team. While Shadow IT remains an evolving challenge...
  • Originally published by Britive. As multi-cloud business operations proliferated throughout 2023, it became clear that the future of cloud security favors those committed to staying on the cutting edge of access management. 2023 delivered an arsenal of innovative trends and strategies...
  • Originally published by CXO REvolutionaries. Written by Christopher Jablonski, Director, CXO REvolutionaries & Community, Zscaler. Given what we’ve observed since the launch of OpenAI’s ChatGPT last Fall, generative AI and large language models look poised to eventually make every...
  • Written by Sanjay Karandikar, Director & Global Practice Head for IAM, Cybersecurity, HCLTech. In today's rapidly evolving digital landscape, user identity and cybersecurity concepts have emerged as pivotal concerns. With the widespread adoption of cloud technology and the ever-expanding...