Use two frameworks in unison to control your attack surface & threat exposure: zero trust architecture (ZTA) & continuous ...
Since 2012, Michael Roza has been a pivotal member of the Cloud Security Alliance (CSA) family. He has contributed to over 125 projects, as a Lead Author or Author/Contributor and many more as a ...
With over 15 years of experience in research and technology, John excels at executive-level leadership, relationship management, and strategy development. He is a published author, technologist, and ...
We value your privacy. Our website uses analytics and advertising cookies to improve your browsing experience. Read our full Privacy Policy.
An IEEE standard for local and metropolitan area networks–Port-Based Network Access Control. IEEE 802 LANs are deployed in networks that convey or provide access to critical data, that support mission ...
Ludovic is co-chair for CSA’s Quantum-Safe Security working group, which was formed to address key generation and transmission methods and help the industry understand quantum‐safe methods for ...
DeepSeek AI’s newest model exceeds the capabilities of industry leaders, at much less cost. It’s time to reassess what it ...
Daniele Catteddu, CTO at CSA, discusses current GenAI governance, trust, risk management, and compliance challenges and ...
The EU AI Act strikes a balance between AI innovation & safety. It establishes clear guidelines for risk management, ongoing ...
Zero Trust enhances PAM with adaptive authentication, JIT access, and continuous verification. Learn how to secure privileged accounts in hybrid environments.
Prefer to access this resource without an account? Download it now.