News
Understand the critical next steps to secure and manage your non-human identities (NHIs) effectively. Refine your strategy, ...
When it comes to executing identity processes, 96% of organizations still rely on manual workflows. Automation is the ...
Explore OWASP’s new NHI Top 10 list, designed to standardize non-human identity security and help teams manage these critical ...
Discover how deterministic AI empowers DevSecOps by automating secure, policy-aligned remediations and shifting from detection to proactive enforcement.
Join a Worldwide Professional Network with CSA Chapters Build connections, grow your expertise, and shape the future of cloud security—locally and globally.
The Cloud Security Alliance (CSA), in collaboration with the MITRE Corporation, established the Cloud Adversarial Vectors, Exploits, and Threats (CAVEaT™) Working Group to develop, curate, and ...
This document introduces Valid-AI-ted, CSA’s new AI-powered tool for evaluating STAR Level 1 self-assessments. Learn how the tool uses LLM technology to provide automated, actionable feedback, support ...
Why do organizations migrate to the public cloud? It may sound like a simple question in 2025, but there’s complexity to it.
Walk through how to build a complete system using the Model Context Protocol (MCP), a framework designed to bridge the gap between LLMs and external tools.
Why do organizations migrate to the public cloud? It may sound like a simple question in 2025, but there’s complexity to it. Hint: It isn’t about cost anymore.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results