It’s about opening up a conversation so that our security controls align with the desired outcomes, and so that we can ...
SSE-C stands (well, stood) for “Server Side Encryption- Customer-provided keys”. It allowed you to provide an encryption key ...
Explores how generative AI reshapes Zero Trust, non-human identities, continuous verification, and AI-powered defense in ...
Explores how agentic AI and Non-Human Identities reshape governance, monitoring, and security in cloud environments, with ...
Explores PMKs, CMKs, BYOK, and HYOK, showing how cloud key management models affect risk, control, and regulatory compliance.
Explores how AI impacts IaC security—from misconfigurations to drift—and practical steps like policy-as-code, guardrails, and ...
CSA Chapters unite cloud security professionals worldwide, fostering collaboration, knowledge-sharing, and career growth. CSA Chapter connects you to a vibrant local and global community. Whether you ...
Written by Abel E. Molina, Principal Architect, Security, Microsoft. As we look ahead to 2025, the landscape of cyber threats is evolving at a rapid pace, posing significant challenges for businesses, ...
In the ever-evolving landscape of business, AI Pilot Programs offer a structured approach for companies to harness the potential of artificial intelligence. These initiatives provide a testing ground ...
Written by Noelle Sheck, Communications Manager, CSA. In cloud computing, understanding the shared responsibility model is crucial. As the name implies, the shared responsibility model delineates who ...
Retrieval augmented generation (RAG) is an effective technique used by AI engineers to develop large language model (LLM) powered applications. However, the lack of security controls in RAG-based LLM ...
In an era where cyber threats are becoming increasingly sophisticated, the need for advanced security measures has never been more critical. Enter artificial intelligence (AI) – a game-changer in the ...
Results that may be inaccessible to you are currently showing.
Hide inaccessible results