Explores why AI hallucinations occur like dreams and how to tame them with policy, data integrity, and retrieval-augmented ...
An in-depth examination of the Microsoft Entra ID vulnerability exposing tenant isolation weaknesses, MFA gaps, and ...
Overview of CCM v4.1 updates: 207 controls, 11 new controls, CAIQ v4.1, and how the Cloud Controls Matrix strengthens cloud ...
Privileged Access Management (PAM) needs to modernize. Learn how to move from always-on admin rights to Zero Standing ...
An overview of the AI Explainability Scorecard, a practical, five-part framework that helps teams quantify how well their ...
A practical guide to applying Zero Trust in OT manufacturing, focusing on identity, segmentation, and continuous verification.
Learn the core concepts, best practices and recommendation for securing an organization on the cloud regardless of the provider or platform. Covering all 14 domains from the CSA Security Guidance v4, ...
Learn the core concepts, best practices and recommendation for securing an organization on the cloud regardless of the provider or platform. Covering all 14 domains from the CSA Security Guidance v4, ...
For those who want to learn from the industry's first benchmark for measuring Zero Trust skill sets, the CCZT includes foundational Zero Trust components released by CISA and NIST, innovative work in ...
An IEEE standard for local and metropolitan area networks–Port-Based Network Access Control. IEEE 802 LANs are deployed in networks that convey or provide access to critical data, that support mission ...
AI technologies have become deeply embedded across modern enterprises, driving efficiency, automating workflows, and transforming business operations. Yet, as adoption accelerates, organizations are ...
Explore CSA's past events, showcasing presentations and session recordings from our virtual and in-person events. Whether you're researching specific topics, looking for insights from industry leaders ...