All The Latest!

Keeping up with cyber-news is hard. Enjoy our specially curated collection of various RSS feeds to help make finding relevant news a little less tedious. If you have something to share, be sure to let us know!

CSA Feed

  • AI Agents Are Talking, Are You Listening?
    April 8, 2026

    If you ask most security teams who has access to their customer data, they can usually give you a clear answer. They can point to OAuth scopes, user permissions, API keys, and audit logs to back it up …

  • Software Supply Chain Security Needs an Upgrade
    April 8, 2026

    Software supply chain security has moved from niche concern to board-level issue, and for good reason. Developers rarely build modern software from scratch. Instead, they assemble it from open source …

  • How to Choose the Right AI Standard: A 7-Point Guide
    April 8, 2026

    AI adoption has accelerated across sectors today as the technology becomes easier to access and deploy. Most organizations embed it in at least one aspect of their daily operations, but doing so has a …

  • When AI Agents Serve Shared Workspaces, Authorization Must Follow the Audience
    April 8, 2026

    This is the sixth blog in a seven-part series on identity security as AI security. TL;DR: AI agents retrieve data using the permissions of whoever they authenticate as (checked), but output to shared …

  • A CISO’s Guide to Cloud Security Architecture
    April 8, 2026

      The Importance of Securing Cloud Architecture: Safeguarding Data and Ensuring Business Continuity You may think migrating to cloud computing is just a trend, but this isn’t the case. It’s actually a …

Tech Target

  • virtual firewall
    May 23, 2024

    A virtual firewall is a firewall device or service that provides network traffic filtering and monitoring for virtual machines (VMs) in a virtualized environment.

  • Cloud Security Alliance (CSA)
    April 30, 2024

    The Cloud Security Alliance (CSA) is a nonprofit organization that promotes research into best practices for securing cloud computing and the use of cloud technologies to secure other forms of computi …

  • Cloud database security: Best practices, challenges and threats
    April 10, 2024

    If your company is using a cloud database, it's critical to stay on top of security. Review the security features offered by top cloud providers, plus some best practices.

  • cloud audit
    March 4, 2024

    A cloud audit is an assessment of a cloud computing environment and its services, based on a specific set of controls and best practices.

  • SOC 2 (System and Organization Controls 2)
    August 3, 2023

    SOC 2 (System and Organization Controls 2), pronounced "sock two," is a voluntary compliance standard for ensuring that service providers properly manage and protect the sensitive data in th …

Schneier On Security

  • ICE Uses Graphite Spyware
    April 22, 2026

    ICE has admitted that it uses spyware from the Israeli company Graphite.

  • Mexican Surveillance Company
    April 21, 2026

    Grupo Seguritech is a Mexican surveillance company that is expanding into the US.

  • Is “Satoshi Nakamoto” Really Adam Back?
    April 20, 2026

    The New York Times has a long article where the author lays out an impressive array of circumstantial evidence that the inventor of Bitcoin is the cypherpunk Adam Back. I don’t know. The article is co …