News
Understand the critical next steps to secure and manage your non-human identities (NHIs) effectively. Refine your strategy, ...
When it comes to executing identity processes, 96% of organizations still rely on manual workflows. Automation is the ...
Explore OWASP’s new NHI Top 10 list, designed to standardize non-human identity security and help teams manage these critical ...
The CCM includes Virtualization & Infrastructure Security controls about network security, virtualization technology, and the protection of other IT facilities.
Discover how deterministic AI empowers DevSecOps by automating secure, policy-aligned remediations and shifting from detection to proactive enforcement.
Explore the roots of employee resistance to AI. Address AI fears and implement concrete strategies for productive AI adoption across the organization.
This document introduces Valid-AI-ted, CSA’s new AI-powered tool for evaluating STAR Level 1 self-assessments. Learn how the tool uses LLM technology to provide automated, actionable feedback, support ...
Join a Worldwide Professional Network with CSA Chapters Build connections, grow your expertise, and shape the future of cloud security—locally and globally.
The challenge of identity management for AI agents centers on the question: What kind of identity should your AI agent ...
Learn CIEM and secure cloud access best practices: effective identity visibility, least-privilege, zero‑standing privileges, ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results