News

The Enterprise Resource Planning (ERP) working group seeks to develop best practices to enable organizations that run their business on large ERP implementations, such as SAP or Oracle applications, ...
CSA and Northeastern University’s Trusted AI Safety Knowledge Certification Program trains professionals to build, secure, ...
Walk through what makes Kubernetes security so challenging and how security teams can get started with it in a way that sets ...
Explore how AI and data privacy are reshaping global business, driving innovation, and demanding agile, ethical governance ...
Uncover key insights from AI red teaming experts on securing generative AI systems against adversarial attacks, harmful ...
As cyber threats get smarter, companies are using Zero Trust Security Models to keep their data safe. This way of thinking ...
Cloud security providers aren't all the same, and knowing what to look for and what questions to ask when making a decision ...
Explore how healthcare organizations can safeguard patient care by addressing cyber risks through modernization and resilient security strategies.
Anyone can join a working group, whether you have years of experience or want to just participate as a fly on the wall. The time commitment for this group varies depending on the project. You can ...
The Cloud Controls Matrix (CCM) is a framework of controls that are essential for cloud computing security. It is created and updated by CSA and aligned to CSA best practices. You can use CCM to ...