Daniele Catteddu, CTO at CSA, discusses current GenAI governance, trust, risk management, and compliance challenges and ...
The EU AI Act strikes a balance between AI innovation & safety. It establishes clear guidelines for risk management, ongoing ...
We're drowning in compliance requirements while struggling to show real security improvement. CSA’s CEO Jim Reavis shares an initiative addressing this problem.
If you’re building a zero trust architecture, microsegmentation should be a crucial part of your plan. Here are the 10 things ...
Understand why you need to look beyond your internal security practices. Define third-party risk management and realize its ...
Debunk common myths about non-human identities, from lifecycle management to security tools. Learn how to secure NHIs in ...
Remote Browser Isolation (RBI) secures access to web applications and content on personal devices, strengthening Bring Your ...
Finding the right Privileged Access Management (PAM) solution is critical. Here are 5 questions that will help you find a ...
Learn the core concepts, best practices and recommendation for securing an organization on the cloud regardless of the provider or platform. Covering all 14 domains from the CSA Security Guidance v4, ...
We value your privacy. Our website uses analytics and advertising cookies to improve your browsing experience. Read our full Privacy Policy.
Filling the cyber talent gap requires diversity, representation, and collaboration. Learn how initiatives like Girls Who Code ...