All The Latest!
Keeping up with cyber-news is hard. Enjoy our specially curated collection of various RSS feeds to help make finding relevant news a little less tedious. If you have something to share, be sure to let us know!
Keeping up with cyber-news is hard. Enjoy our specially curated collection of various RSS feeds to help make finding relevant news a little less tedious. If you have something to share, be sure to let us know!
Written by Olivia Rempe, Community Engagement Manager, CSA. In recent years, artificial intelligence has shown extraordinary promise—but also a troubling vulnerability: when it fails, it often fails …
Originally published by Valence Security. Written by John Filitz. A sophisticated attack vector known as “consent phishing” has emerged as a significant SaaS security threat. Unlike traditional phis …
Originally published by CXO REvolutionaries. Written by Ben Corll, CISO in Residence, Zscaler. 24 specific things you can do to strengthen your security program against today's top threats As w …
Originally published by Kaot.ai. Summary Open-source models are free, customizable, and community-driven, while closed-source models are proprietary with limited customization and professional suppo …
The Cloud Controls Matrix (CCM) is a framework of controls that are essential for cloud computing security. It is created and updated by CSA and aligned to CSA best practices. You can use CCM to syste …
The Cloud Security Alliance (CSA) is a nonprofit organization that promotes research into best practices for securing cloud computing and the use of cloud technologies to secure other forms of computi …
If your company is using a cloud database, it's critical to stay on top of security. Review the security features offered by top cloud providers, plus some best practices.
A cloud audit is an assessment of a cloud computing environment and its services, based on a specific set of controls and best practices.
SOC 2 (System and Organization Controls 2), pronounced "sock two," is a voluntary compliance standard for ensuring that service providers properly manage and protect the sensitive data in th …
Hypervisor security is the process of ensuring the hypervisor — the software that enables virtualization — is secure throughout its lifecycle.
In response to a FOIA request, the NSA released “Fifty Years of Mathematical Cryptanalysis (1937-1987),” by Glenn F. Stahly, with a lot of redactions. Weirdly, this is the second time the NSA has decl …
From Hackaday.com, this is a neural network simulation of a pet squid. Autonomous Behavior: The squid moves autonomously, making decisions based on his current state (hunger, sleepiness, etc.). Implem …
This is a weird story: U.S. energy officials are reassessing the risk posed by Chinese-made devices that play a critical role in renewable energy infrastructure after unexplained communication equipme …