CSA’s CCZT is a comprehensive training and certificate program for Zero Trust. CCZT is your on-ramp to becoming an accredited ...
Cloud providers are continually evolving, employing advanced tech like AI. Here are some key trends shaping the future of ...
Explore effective strategies to defend against ransomware, focusing on overcoming challenges to enhance organizational ...
Chair of the CSA AI Governance and Compliance Working Group. Generative AI: Embracing Hallucinations for Responsible ...
Explore effective security practices for Slack, highlighting the importance of robust offboarding procedures to prevent ...
Four vulnerabilities have been discovered that target Docker container environments: CVE-2024-21626, CVE-2024-23651, CVE-2024-23652, and CVE-2024-23653.
Are you a research volunteer? Request to have your profile displayed on the website here.
Written by Uday Srinivasan, CTO, Acante. We previously discussed how the modern data stack has changed the threat landscape today. In part II, below, we outline exactly how security and data teams can ...
At the end of 2023, the California Privacy Protection Agency (CPPA) unveiled draft regulations aimed at automated decision-making technology (ADMT), including ...
The cybersecurity landscape is undergoing a significant shift, moving from security tools monitoring applications running within userspace to advanced, real-time approaches that monitor system ...
On 29 March 2024, the cybersecurity community turned its attention to a newly disclosed vulnerability in XZ Utils, identified as CVE-2024-3094. This backdoor vulnerability has sent ripples across the ...