All The Latest!

Keeping up with cyber-news is hard. Enjoy our specially curated collection of various RSS feeds to help make finding relevant news a little less tedious. If you have something to share, be sure to let us know!

CSA Feed

  • The First Question Security Should Ask on AI Projects
    January 9, 2026

      Why? What is our desired outcome? Such a simple question. Such a profound question. I’ve been contemplating writing this post for a while now, but struggled with the framing. Throughout 2025 I start …

  • Cloud 2026: The Shift to AI Driven, Sovereign and Hyperconnected Digital Ecosystems
    January 6, 2026

    Contributed by Tata Communications. Originally published on Business Today. A decade ago, moving to the cloud was seen as a simple upgrade to help companies work faster, scale easily and reduce costs. …

  • What AI Risks Are Hiding in Your Apps?
    January 6, 2026

    AI is transforming business operations, offering unprecedented productivity, faster decision-making, and new competitive edges. As per Gartner, by 2028, more than 95% of enterprises will be using gene …

  • AWS Ends SSE-C Encryption, and a Ransomware Vector
    January 5, 2026

    You probably weren’t using it anyway, so might as well cut the cruft and end a lesser-known attack vector. I’m a bit late to the party, but this morning I learned that AWS is ending support for a feat …

  • How Generative AI is Reshaping Zero Trust Security
    January 5, 2026

      Part 1 of 7 in the CSA Series: AI and the Zero Trust Transformation The security landscape has shifted beneath our feet. Generative AI hasn't just added new tools to the defender's arsenal …

Tech Target

  • virtual firewall
    May 23, 2024

    A virtual firewall is a firewall device or service that provides network traffic filtering and monitoring for virtual machines (VMs) in a virtualized environment.

  • Cloud Security Alliance (CSA)
    April 30, 2024

    The Cloud Security Alliance (CSA) is a nonprofit organization that promotes research into best practices for securing cloud computing and the use of cloud technologies to secure other forms of computi …

  • Cloud database security: Best practices, challenges and threats
    April 10, 2024

    If your company is using a cloud database, it's critical to stay on top of security. Review the security features offered by top cloud providers, plus some best practices.

  • cloud audit
    March 4, 2024

    A cloud audit is an assessment of a cloud computing environment and its services, based on a specific set of controls and best practices.

  • SOC 2 (System and Organization Controls 2)
    August 3, 2023

    SOC 2 (System and Organization Controls 2), pronounced "sock two," is a voluntary compliance standard for ensuring that service providers properly manage and protect the sensitive data in th …

Schneier On Security

  • AI-Powered Surveillance in Schools
    January 19, 2026

    It all sounds pretty dystopian: Inside a white stucco building in Southern California, video cameras compare faces of passersby against a facial recognition database. Behavioral analysis AI reviews th …

  • AI and the Corporate Capture of Knowledge
    January 16, 2026

    More than a decade after Aaron Swartz’s death, the United States is still living inside the contradiction that destroyed him. Swartz believed that knowledge, especially publicly funded knowledge, shou …

  • New Vulnerability in n8n
    January 15, 2026

    This isn’t good: We discovered a critical vulnerability (CVE-2026-21858, CVSS 10.0) in n8n that enables attackers to take over locally deployed instances, impacting an estimated 100,000 servers global …