Use two frameworks in unison to control your attack surface & threat exposure: zero trust architecture (ZTA) & continuous ...
With over 15 years of experience in research and technology, John excels at executive-level leadership, relationship management, and strategy development. He is a published author, technologist, and ...
We value your privacy. Our website uses analytics and advertising cookies to improve your browsing experience. Read our full Privacy Policy.
An IEEE standard for local and metropolitan area networks–Port-Based Network Access Control. IEEE 802 LANs are deployed in networks that convey or provide access to critical data, that support mission ...
Ludovic is co-chair for CSA’s Quantum-Safe Security working group, which was formed to address key generation and transmission methods and help the industry understand quantum‐safe methods for ...
DeepSeek AI’s newest model exceeds the capabilities of industry leaders, at much less cost. It’s time to reassess what it ...
Daniele Catteddu, CTO at CSA, discusses current GenAI governance, trust, risk management, and compliance challenges and ...
The EU AI Act strikes a balance between AI innovation & safety. It establishes clear guidelines for risk management, ongoing ...
Zero Trust enhances PAM with adaptive authentication, JIT access, and continuous verification. Learn how to secure privileged accounts in hybrid environments.
SEATTLE – Jan. 29, 2025 – Today, the Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud ...
Prefer to access this resource without an account? Download it now.