News

CSA and Northeastern University’s Trusted AI Safety Knowledge Certification Program trains professionals to build, secure, ...
Walk through what makes Kubernetes security so challenging and how security teams can get started with it in a way that sets ...
Explore how AI and data privacy are reshaping global business, driving innovation, and demanding agile, ethical governance ...
As AI research advances, model distillation will likely expand into new applications and improve the ability to address ...
Explore key cloud security challenges and strategies to protect digital assets, ensuring resilience in today's hybrid and ...
As cyber threats get smarter, companies are using Zero Trust Security Models to keep their data safe. This way of thinking ...
Explore how healthcare organizations can safeguard patient care by addressing cyber risks through modernization and resilient security strategies.
The Enterprise Resource Planning (ERP) working group seeks to develop best practices to enable organizations that run their business on large ERP implementations, such as SAP or Oracle applications, ...
We value your privacy. Our website uses analytics and advertising cookies to improve your browsing experience. Read our full Privacy Policy.
Offers an industry-accepted way to document what security controls exist in IaaS, PaaS, and SaaS services. It provides a set of Yes/No questions a cloud consumer and cloud auditor may wish to ask of a ...
Founded in 2013 by the Cloud Security Alliance, the Security Trust Assurance and Risk (STAR) registry encompasses key principles of transparency, rigorous auditing, and cloud security and privacy best ...