资讯

In 2023, a threat actor launched a social engineering campaign on Retool involving smishing & credential harvesting, leading them to a one-time password token.
This comprehensive glossary combines all the glossaries created by CSA Working Groups and research contributors into one place. If you have a question or need other assistance please reach out to ...
This mapping aims to identify the alignment between the AICM’s controls and the EU AI Act’s requirements, identifying areas of full, partial, or no coverage. Each control in the AICM is compared ...
These organizations have signed the CSA AI Trustworthy Pledge, demonstrating their commitment to responsible AI development and deployment. Each signed organization has affirmed their alignment with ...
The flexibility and scalability of virtualization comes with significant risks if security and management practices are not ...
Why do manual identity workflows continue to exist, when the consequences of getting them wrong are so serious and when ...
CSA is moving toward a more streamlined community experience for joining working groups, connecting with local chapters, and engaging with training communities.
The CSA CxO Trust initiatives will help CISOs communicate the business risks and compliance issues of cloud computing and cybersecurity to their peers within the C-Suite.
CSA's AI Controls Matrix represents a paradigm shift in AI governance, providing the first comprehensive framework designed for trustworthy AI implementation.
Access tools and resources to guide zero trust implementation. In this center you can find educational tools and guidance to further zero trust within your organization.
Working Group Overview This working group aims to develop Zero Trust standards to achieve consistency for cloud, hybrid and mobile endpoint environments. The topic of group discourse include Zero ...
Download event presentations from past events hosted by the Cloud Security Alliance.