News
These implementation guidelines are designed to support organizations and cloud service providers in understanding and operationalizing the new CCM v4.1 controls. Developed in alignment with the ...
This weekend, I watched Jurassic Park for the first time, and while most people might walk away from the film seeing it as a cautionary tale about the dangers of unchecked scientific ambition and the ...
QR codes promise convenience, but most people don’t realize the sheer ease with which those codes can be weaponized. Learn ...
Steer clear of the dangers of oversharing on social media. This blog offers examples of what can go wrong and easy-to-follow ...
Learn what e‑skimming is, why it’s so dangerous, how PCI DSS v4.x addresses it, and some of the options available to help you ...
This document is designed for assessment firms participating in CSA’s STAR Certification or Attestation program. It provides a strategic, practical guide for firms looking to effectively upsell STAR ...
This publication from the CSA AI Technology and Risk Working Group addresses the unique security challenges of agentic AI. As AI transitions from passive tools to autonomous decision-makers, ...
Learn how homoglyph attacks work, why they’re a growing concern for major brands, and how DNS Posture Management defends ...
CSA’s CCM includes cloud security monitoring and logging controls. Implement effective incident response, audit log security, clock synchronization, and more.
Recent global events highlight the need to look at computer networks as an adversary would. AI tools are lowering the bar for hacktivists hoping to wreak havoc.
These auditing guidelines are designed to support organizations and auditors in evaluating how effectively cloud service providers implement the new CCM v4.1 controls. Drafted in alignment with the ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results