News
The Enterprise Resource Planning (ERP) working group seeks to develop best practices to enable organizations that run their business on large ERP implementations, such as SAP or Oracle applications, ...
This working group aims to develop a holistic Cloud Incident Response framework that comprehensively covers key causes of cloud incidents (both security and non-security related), and their handling ...
CSA and Northeastern University’s Trusted AI Safety Knowledge Certification Program trains professionals to build, secure, ...
Walk through what makes Kubernetes security so challenging and how security teams can get started with it in a way that sets ...
The Cloud Controls Matrix (CCM) is a framework of controls that are essential for cloud computing security. It is created and updated by CSA and aligned to CSA best practices. You can use CCM to ...
As cyber threats get smarter, companies are using Zero Trust Security Models to keep their data safe. This way of thinking ...
It's no secret: many organizations view and treat phishing as a periodic checkbox assessment. It’s often a basic email template sent to an entire organization. If someone clicks the link, they are ...
Model distillation is a technique that trains smaller AI models to mimic the performance of larger, more complex models, reducing computational resources and enhancing efficiency. This technique is ...
Explore how AI and data privacy are reshaping global business, driving innovation, and demanding agile, ethical governance ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results