Are zero-knowledge proofs used in machine learning at all? This blog post answers this question and explores the potential ...
Governing scanner adoption in DevSecOps involves strategic hooks and governance. Explore best practices for each stage of the ...
Recent CSA survey data shows that organizations are struggling to manage permissions and API keys. (API keys are the codes ...
“Defenders think in lists, attackers think in graphs” said John Lambert from Microsoft, distilling the fundamental difference in mindset between those who defend IT systems and those who try to ...
Originally published by Veeam Software. Written by Javier Perez, Sr. Director of Product Marketing for Security at Veeam Software. Cyber extortion is no longer just a headline —it's a daily challenge ...
Learn the core concepts, best practices and recommendation for securing an organization on the cloud regardless of the provider or platform. Covering all 14 domains from the CSA Security Guidance v4, ...
Enterprises are overhauling their cybersecurity strategies to combat rising cyber threats. Learn how integrated approaches ...
Originally published by Tata Communications. Written by Neelakantan Venkataraman, Vice President and Global Head - Cloud and Edge Business, Tata Communications. In today’s ever-evolving IT landscape, ...
Since 2012 Michael has contributed to over 100 CSA projects completed by CSA's Internet of Things, Zero Trust/Software-Defined Perimeter, Top Threats, Cloud Control Matrix, Containers/Microservices, ...