资讯

The Cloud Security Alliance’s CFO encourages others beginning on their AI journeys to continue forging a path into this ...
Staff records must be cleared to avoid compliance issues & unauthorized access. Adopt a systematic method for erasing, ...
Application fabrics provide a governance layer that simplifies visibility, enabling enterprises to close gaps between ...
The CCSK certificate is highly regarded as the benchmark for cloud security expertise. It provides a comprehensive and unbiased understanding of how to effectively secure data in the cloud. Earning ...
Jon-Michael C. Brook is a certified, 25-year practitioner of cybersecurity, cloud, and privacy. He is the principal contributor to certification sites for privacy and cloud security, and has published ...
Zero Trust is one of the most widely talked about cybersecurity trends today. Zero Trust says no part of a computer and networking system can be implicitly trusted, including the humans operating it.
Explore CSA's past events, showcasing presentations and session recordings from our virtual and in-person events. Whether you're researching specific topics, looking for insights from industry leaders ...
An IEEE standard for local and metropolitan area networks–Port-Based Network Access Control. IEEE 802 LANs are deployed in networks that convey or provide access to critical data, that support mission ...
The CSA Cloud Controls Matrix (CCM) is a cybersecurity control framework for cloud computing. It is composed of 197 control objectives that are structured in 17 domains covering all key aspects of ...
Over 1,300 attendees are expected to participate in CSA's 16th annual Summit, which features industry innovators and experts who will discuss critical emerging technologies and cloud topics that will ...
The goal of this working group is to support the quantum-safe cryptography community in development and deployment of a framework to protect data whether in movement or at rest. We welcome anyone who ...