News

In 2023, a threat actor launched a social engineering campaign on Retool involving smishing & credential harvesting, leading them to a one-time password token.
Why do manual identity workflows continue to exist, when the consequences of getting them wrong are so serious and when ...
Guidance for SMBs transitioning to a Zero Trust architecture. Explore key components such as identity verification, endpoint security, & network segmentation. Korean translation.
Elevate your customer communications. Elixir’s revolutionary, cloud-native SaaS CCM Solution is set to change the CCM landscape. Break down silos, foster collaboration, and create personalized ...
Email attacks on financial services rose 25% year-over-year. Learn why FinServ is a top target and how threat actors exploit trust to deceive employees.
These organizations have signed the CSA AI Trustworthy Pledge, demonstrating their commitment to responsible AI development and deployment. Each signed organization has affirmed their alignment with ...
Find resources to learn more about microservices and application containers to implement secure DevOps within your organization.
The flexibility and scalability of virtualization comes with significant risks if security and management practices are not ...
CSA is moving toward a more streamlined community experience for joining working groups, connecting with local chapters, and engaging with training communities.
CSA's AI Controls Matrix represents a paradigm shift in AI governance, providing the first comprehensive framework designed ...
Written by Derek Hammack, VP, Operations and Customer Success, CheckRed. Cybercriminals are getting smarter—and stealthier. One of the most dangerous and overlooked threats to your brand is ...
Several critical data governance and security vulnerabilities contributed to the 2023 Toyota data breach, including misconfiguration and inadequate controls.