Security Best Practices for AI, SaaS, Hybrid Cloud, Data Breaches, & More

Security Best Practices for AI, SaaS, Hybrid Cloud, Data Breaches, & More

Get ready for the latest edition of the CSA Roundup, your go-to bimonthly newsletter that brings together the best and most insightful blogs from CSA’s members and partners. In this issue, we dive into key topics including cloud security best practices, AI governance, AI threats and concerns, and recent cyber attacks. So take a seat and explore the expert insights we’ve gathered just for you. And don’t forget to subscribe, so you never miss out on the next issue!


Cloud Security Best Practices

Your complete SaaS security guide—with best practices for ensuring it

SaaS applications are among the most common targets of cyberattacks, which is why they require an elaborate, multifaceted approach to security. Learn how to develop the right approach to SaaS security and better protect your systems and IT assets.

Hybrid Work: Navigating Security Challenges in the Modern Enterprise

Hybrid work has emerged as a dominant organizational model that also introduces complex security challenges. Protect your assets while engaging in this flexible business approach.

Hybrid Cloud Security – Top Challenges and Best Practices

Many companies are opting for a hybrid cloud model, which combines private and public cloud services. Examine the security challenges faced in hybrid cloud setups and review the recommended best practices.

How to Address Cloud Identity Governance Blind Spots

Managing identities across cloud and on-prem systems isn’t getting any easier. Understand the key identity security challenges that organizations face today and what can be done to strengthen governance, visibility, and resilience.


AI Governance, Risk, & Compliance

AI Security and Governance

The rapid adoption of AI technologies brings significant risks and challenges, necessitating that AI systems operate transparently, ethically, and within regulatory frameworks. Learn how to follow these principles to build an AI governance program.

Why GRC is key to safely unlocking ROI from design, hosting, and AI

According to G2’s State of Software Report 2024, tools in design, hosting, and AI categories are leading the way in delivering faster ROI than any other software. Explore how these high-ROI categories are reshaping the software landscape—and why GRC enables businesses to innovate responsibly.

What you need to know about South Korea’s AI Basic Act

In January, South Korea became the second entity to propose AI regulation with the passing of the AI Basic Act. The act will be enforced in January 2026. Understand its key points. 


Top AI Security Concerns

AI Software Supply Chain Risks Prompt New Corporate Diligence

It is often hard to understand or predict downstream threats to cybersecurity that originate in the AI software supply chain. Learn how to mitigate the risks.

Are You Asking the Right Questions About AI?

The UK’s National Cyber Security Centre put out a report warning that AI is likely to make ransomware attacks even worse worldwide. Discover eight tough questions CISOs should be asking themselves about AI and cybersecurity.

Rethinking Data Risk in the AI Era: Why Organizations Need a Unified Approach

The rapid adoption of AI and an evolving threat landscape have confronted organizations with an undeniable reality: fragmented, legacy solutions are no longer enough. Understand the complexity of modern data risk and how to shift to a unified and modular data risk strategy.


Reflections on Cyber Attacks & Breaches

Top Threat #11 - APT Anxiety: Battling the Silent Threats

In the conclusion of an ongoing blog series, CSA covers the final threat from the Top Threats to Cloud Computing 2024 report: Advanced Persistent Threats (APTs). Learn more about APTs -sophisticated adversaries that conduct long-term attack campaigns targeting sensitive cloud resources.

What the File Transfer Breach Crisis Means for MFT Security

In May 2023, Amazon suffered a significant data breach due to a vulnerability in its MFT service. This breach is hardly the only cautionary tale: thousands of organizations have been breached in the last two years through a similar “MFT attack vector.” Understand what’s at stake and what your top priorities need to be.

The Evolution of DDoS Attacks: Why APIs Are in the Crosshairs

A recent report highlighted that India faced a 3000% rise in API-targeted DDoS attacks in just three months. Discover how DDoS attack patterns are changing and what this impacts.


Check out more CSA blogs.

Mauricio Ortiz, CISA

Great dad | Inspired Risk Management and Security | Cybersecurity | AI Governance & Security | Data Science & Analytics My posts and comments are my personal views and perspectives but not those of my employer

3mo

Cloud Security Alliance extraordinary compilation of articles.

Like
Reply

To view or add a comment, sign in

Others also viewed

Explore topics