Hear from Willy Fabritius, Global Head of Strategy at SGS. Discover the cybersecurity insights that Willy has learned ...
Explore how AI is shaping the future of cybersecurity on both ends: empowering defenders and assisting attackers. Also have a ...
Strengthen Google Workspace security by moving beyond app-specific passwords, enforcing MFA, and transitioning to OAuth or ...
Learn about CISO Alex Getsin’s contributions to CSA Research, including the Top Threats series, and why he continues to stay ...
The Alert Readiness Framework aligns with Gartner's augmented cybersecurity vision, enhancing resilience, streamlining tools, ...
Get an overview of the major challenges that the Common Vulnerabilities and Exposures (CVE) program faces in today’s ...
Originally published by BARR Advisory. Artificial intelligence (AI) is transforming the way businesses operate across ...
Privileged access management vendors are claiming they can provide access with zero standing privileges (ZSP). Dig into some ...
Learn the core concepts, best practices and recommendation for securing an organization on the cloud regardless of the provider or platform. Covering all 14 domains from the CSA Security Guidance v4, ...
Learn about Pete Chronis’ multifaceted involvement with CSA and how he sees CSA contributing to the future of cloud and ...
Originally published by Abnormal Security. Account takeover (ATO) is a well-known attack method that has been documented for years. However, a less common type of attack occurs when ATO is used as the ...
As many of you have read my past blogs, I like to quote individuals who have had experience in certain subjects. Although the ...