Written by Troy Leach, Chief Strategy Officer (CSO), CSA. We require a modern approach to accurately assess our use of current technology. This month marks 25 years since I managed my first ...
Texas Attorney General Ken Paxton has successfully challenged Google’s monopolistic practices, with the U.S. District Court for the District of Columbia ruling in favor of Paxton’s allegations. The ...
It should shock no one that financial services organizations are a major target for cybercrime. In fact, according to the World Economic Forum, financial organizations are the number 2 target, ...
Founded in 2013 by the Cloud Security Alliance, the Security Trust Assurance and Risk (STAR) registry encompasses key principles of transparency, rigorous auditing, and cloud security and privacy best ...
An IEEE standard for local and metropolitan area networks–Port-Based Network Access Control. IEEE 802 LANs are deployed in networks that convey or provide access to critical data, that support mission ...
With over 15 years of experience in research and technology, John excels at executive-level leadership, relationship management, and strategy development. He is a published author, technologist, and ...
With over 15 years of experience in research and technology, John excels at executive-level leadership, relationship management, and strategy development. He is a published author, technologist, and ...
Learn the core concepts, best practices and recommendation for securing an organization on the cloud regardless of the provider or platform. Covering all 14 domains from the CSA Security Guidance v4, ...
Anyone can join a working group, whether you have years of experience or want to just participate as a fly on the wall. The time commitment for this group varies depending on the project. You can ...