<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0">
  <channel>
    <title>Cloud Security Alliance</title>
    <description>The Cloud Security Alliance (CSA) is the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment.</description>
    <link>https://cloudsecurityalliance.org/feed</link>
    <language>en</language>
    <item>
      <title>AI Agents vs. AI Chatbots: Understanding the Difference</title>
      <pubDate>Sat, 14 Jun 2025 00:11:25 -0700</pubDate>
      <link>https://cloudsecurityalliance.org/articles/ai-agents-vs-ai-chatbots-understanding-the-difference</link>
      <guid>https://cloudsecurityalliance.org/articles/ai-agents-vs-ai-chatbots-understanding-the-difference</guid>
      <description>
  
Originally published by Astrix.

Written by&amp;nbsp;Alon Berger.

&amp;nbsp;

While AI chatbots respond, AI agents act. Both automate tasks, but the security implications differ significantly, primarily due to how they interact with NHIs. Agents make autonomous decisions, through adaptive learning, while Chatbots stick to scripts and predictable interactions. Let’s dive into what sets them apart.

&amp;nbsp;

Key differentiations

AI Chatbots: predictable, constrained, and easier to secure

AI chatb...</description>
    </item>
    <item>
      <title>Why Your SaaS Security Strategy Needs Automated Remediation</title>
      <pubDate>Thu, 12 Jun 2025 11:13:54 -0700</pubDate>
      <link>https://cloudsecurityalliance.org/articles/why-your-saas-security-strategy-needs-automated-remediation</link>
      <guid>https://cloudsecurityalliance.org/articles/why-your-saas-security-strategy-needs-automated-remediation</guid>
      <description>
  




Originally published by Valence Security.

Written by&amp;nbsp;John Filitz.

&amp;nbsp;



Your security team is operating with a dangerous blind spot. Your SaaS environment is likely the most vulnerable aspect of your security posture due to unremediated and escalating cyber risk. Even if you're using a first generation SaaS Security Posture Management (SSPM) solution, the uncomfortable truth is that you have a significant degree of unremediated risk.&amp;nbsp;

This is because manual remediatio...</description>
    </item>
    <item>
      <title>Implementing CCM: Interoperability &amp; Portability Controls</title>
      <pubDate>Wed, 11 Jun 2025 18:45:50 -0700</pubDate>
      <link>https://cloudsecurityalliance.org/articles/implementing-ccm-interoperability-portability-controls</link>
      <guid>https://cloudsecurityalliance.org/articles/implementing-ccm-interoperability-portability-controls</guid>
      <description>
  

The Cloud Controls Matrix (CCM) is a framework of controls that are essential for cloud computing security. The CCM is created and updated by CSA and aligned to CSA best practices.

You can use CCM to systematically assess and guide the security of any cloud implementation. CCM also provides guidance on which actors within the cloud supply chain should implement which security controls. Both cloud service customers (CSCs) and cloud service providers (CSPs) use CCM in many ways.

CSCs use...</description>
    </item>
    <item>
      <title>Closing the Blind Spot in Enterprise DNS Security: Why DNS Posture Management Matters</title>
      <pubDate>Wed, 11 Jun 2025 13:43:41 -0700</pubDate>
      <link>https://cloudsecurityalliance.org/articles/closing-the-blind-spot-in-enterprise-dns-security-why-dns-posture-management-matters</link>
      <guid>https://cloudsecurityalliance.org/articles/closing-the-blind-spot-in-enterprise-dns-security-why-dns-posture-management-matters</guid>
      <description>
  
Originally published by CheckRed.

Written by&amp;nbsp;Derek Hammack, VP, Operations and Customer Success,&amp;nbsp;CheckRed.

&amp;nbsp;


As enterprise security teams work to protect sprawling multi-cloud environments, one foundational layer remains dangerously underprotected: the Domain Name System (DNS).

DNS is the backbone of modern digital infrastructure—translating domain names into IP addresses and routing traffic between users, applications, and services. Despite this critical role, DNS is ...</description>
    </item>
    <item>
      <title>Valid-AI-ted: A Major Step Towards Real-Time Cloud Assurance</title>
      <pubDate>Tue, 10 Jun 2025 22:55:03 -0700</pubDate>
      <link>https://cloudsecurityalliance.org/articles/valid-ai-ted-a-major-step-towards-real-time-cloud-assurance</link>
      <guid>https://cloudsecurityalliance.org/articles/valid-ai-ted-a-major-step-towards-real-time-cloud-assurance</guid>
      <description>
  



Written by Jim Reavis, CEO &amp;amp; Co-Founder, Cloud Security Alliance.

&amp;nbsp;

Today, at our Cloud Trust Summit, we officially launched Valid-AI-ted, the industry’s first AI-assisted quality check for STAR Level 1 self-assessments. Within hours of opening the submission portal, providers were uploading CAIQs to see how they measure up, while enterprise risk teams asked how the new badge can sharpen their due-diligence process.

In this post, I’d like to share where we’re headed next—an...</description>
    </item>
    <item>
      <title>Boost Cloud Security Without Bugging Your Developers</title>
      <pubDate>Tue, 10 Jun 2025 22:41:33 -0700</pubDate>
      <link>https://cloudsecurityalliance.org/articles/boost-cloud-security-without-bugging-your-developers</link>
      <guid>https://cloudsecurityalliance.org/articles/boost-cloud-security-without-bugging-your-developers</guid>
      <description>
  
Originally published by CyberArk.

Written by&amp;nbsp;Brooke Jameson, Senior Product Marketing Manager,&amp;nbsp;CyberArk.

&amp;nbsp;

Developers are incredibly valuable to an organization’s progress and evolution. They must innovate quickly while simultaneously navigating changes to their day-to-day operations as companies heighten security requirements in the cloud.

If developers find these security measures cumbersome, creating hurdles that plague their progress, they will likely bypass them al...</description>
    </item>
    <item>
      <title>Cloud Security Alliance Brings AI-Assisted Auditing to Cloud Computing</title>
      <pubDate>Tue, 10 Jun 2025 14:29:31 -0700</pubDate>
      <link>https://cloudsecurityalliance.org/articles/cloud-security-alliance-brings-ai-assisted-auditing-to-cloud-computing</link>
      <guid>https://cloudsecurityalliance.org/articles/cloud-security-alliance-brings-ai-assisted-auditing-to-cloud-computing</guid>
      <description>
  
Valid-AI-ted provides an automated quality check of STAR Level 1 self-assessments using state-of-the-art LLM technology

SEATTLE – June 11, 2025 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment, today introduced an innovative addition to its suite of Security, Trust, Assurance and Risk (STAR) Registry assessments with the launch of Valid-AI-ted, an A...</description>
    </item>
    <item>
      <title>Cloud Security Alliance’s AI Safety Initiative Named a 2025 CSO Awards Winner</title>
      <pubDate>Tue, 10 Jun 2025 12:48:46 -0700</pubDate>
      <link>https://cloudsecurityalliance.org/articles/csa-ai-safety-initiative-named-a-2025-cso-awards-winner</link>
      <guid>https://cloudsecurityalliance.org/articles/csa-ai-safety-initiative-named-a-2025-cso-awards-winner</guid>
      <description>
  

Program recognized for driving innovation and strategic vision

SEATTLE – June 12, 2025 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment, is excited to announce that its AI Safety Initiative has been named a winner of the 2025 CSO Awards, which recognize organizations for their exceptional security projects and initiatives that showcase substantial ...</description>
    </item>
    <item>
      <title>How to Stop Expired Secrets from Disrupting Your Operations</title>
      <pubDate>Mon, 09 Jun 2025 12:32:20 -0700</pubDate>
      <link>https://cloudsecurityalliance.org/articles/how-to-stop-expired-secrets-from-disrupting-your-operations</link>
      <guid>https://cloudsecurityalliance.org/articles/how-to-stop-expired-secrets-from-disrupting-your-operations</guid>
      <description>
  





Originally published by Aembit.

Written by Dan Kaplan.

&amp;nbsp;

You and your team have just received that dreaded late-night alert: “Authentication failure in production.” Your team’s carefully built service is down, not because of a sophisticated ransomware attack or some complex virus, but something far more mundane: an expired API key that nobody remembered to rotate.

In modern cloud-native environments, authentication isn’t just about users logging in, it’s about machines, serv...</description>
    </item>
    <item>
      <title>Why Early Adoption of ISO 42001 Matters</title>
      <pubDate>Mon, 09 Jun 2025 12:08:34 -0700</pubDate>
      <link>https://cloudsecurityalliance.org/articles/why-early-adoption-of-iso-42001-matters</link>
      <guid>https://cloudsecurityalliance.org/articles/why-early-adoption-of-iso-42001-matters</guid>
      <description>
  
Originally published by A-LIGN.

&amp;nbsp;


As AI governance grows in importance, many organizations are planning for compliance. The&amp;nbsp;2025 Compliance Benchmark Report, which gathered insights from over 1000 compliance professionals across various industries, found that 76% of organizations plan to pursue AI compliance soon with a framework like ISO 42001. Although ISO 42001 isn’t yet the definitive standard due to the dynamic nature of AI governance, it offers a comprehensive solution,...</description>
    </item>
    <item>
      <title>Cloud Security Alliance Marks a New Chapter in AI Governance with the AI Trustworthy Pledge</title>
      <pubDate>Sun, 08 Jun 2025 08:32:57 -0700</pubDate>
      <link>https://cloudsecurityalliance.org/articles/csa-marks-a-new-chapter-in-ai-governance-with-ai-trustworthy-pledge</link>
      <guid>https://cloudsecurityalliance.org/articles/csa-marks-a-new-chapter-in-ai-governance-with-ai-trustworthy-pledge</guid>
      <description>
  


Pledge identifies those organizations truly committed to responsible, trustworthy AI

SEATTLE – June 11, 2025 – The AI revolution is reshaping every sector of our economy. But even as AI systems are making decisions that affect millions of lives, organizations are grappling with a host of issues ranging from AI hallucinations to privacy concerns. The traditional approach of building first and securing later won't work in the AI era. Instead, what's needed is a proactive framework that e...</description>
    </item>
    <item>
      <title>Agentic AI is Redefining Identity Security in the Cloud</title>
      <pubDate>Thu, 05 Jun 2025 11:59:26 -0700</pubDate>
      <link>https://cloudsecurityalliance.org/articles/agentic-ai-is-redefining-identity-security-in-the-cloud</link>
      <guid>https://cloudsecurityalliance.org/articles/agentic-ai-is-redefining-identity-security-in-the-cloud</guid>
      <description>
  




Originally published by Britive.

&amp;nbsp;

The emergence of agentic AI is rapidly reshaping how modern enterprises think about automation, autonomy, and security.

Unlike traditional generative AI, which focuses on creating content or identifying patterns, agentic AI represents a more proactive, decision-making force embedded within digital ecosystems.

These AI agents are designed to independently pursue (human-provided) goals, take actions on behalf of users or systems, and even make...</description>
    </item>
    <item>
      <title>Runtime Integrity Measurement Overview</title>
      <pubDate>Wed, 04 Jun 2025 11:50:28 -0700</pubDate>
      <link>https://cloudsecurityalliance.org/articles/runtime-integrity-measurement-overview</link>
      <guid>https://cloudsecurityalliance.org/articles/runtime-integrity-measurement-overview</guid>
      <description>
  

Originally published by Invary.

Written by&amp;nbsp;Dr. Wesley Peck.

&amp;nbsp;

Runtime Integrity Measurement

In this article we’ll dive into the technical details of a real world rootkit, explore how that rootkit compromises an operating system, and then learn how Kernel Integrity Measurement technology detects even novel rootkits that exploit zero day vulnerabilities in systems.

‍Integrity Measurement applied to operating systems provides a powerful security mechanism to ensure that infra...</description>
    </item>
    <item>
      <title>The AI Trust Imperative: Why the CSA AI Trustworthy Pledge Matters Now More Than Ever</title>
      <pubDate>Wed, 04 Jun 2025 11:41:58 -0700</pubDate>
      <link>https://cloudsecurityalliance.org/articles/the-ai-trust-imperative-why-the-csa-ai-trustworthy-pledge-matters-now-more-than-ever</link>
      <guid>https://cloudsecurityalliance.org/articles/the-ai-trust-imperative-why-the-csa-ai-trustworthy-pledge-matters-now-more-than-ever</guid>
      <description>
  



Written by&amp;nbsp;Daniele Catteddu, Chief Technology Officer, CSA.

&amp;nbsp;

Many of us have witnessed firsthand the transformative power of artificial intelligence and the urgent need for responsible innovation that keeps pace with technological advancement.

The artificial intelligence revolution is no longer on the horizon; it's reshaping every sector of our economy today. From healthcare diagnostics to financial services, from autonomous vehicles to content generation, AI systems are ...</description>
    </item>
    <item>
      <title>The 2024 Football Australia Data Breach: A Case of Misconfiguration and Inadequate Change Control</title>
      <pubDate>Wed, 04 Jun 2025 11:33:31 -0700</pubDate>
      <link>https://cloudsecurityalliance.org/articles/the-2024-football-australia-data-breach-a-case-of-misconfiguration-and-inadequate-change-control</link>
      <guid>https://cloudsecurityalliance.org/articles/the-2024-football-australia-data-breach-a-case-of-misconfiguration-and-inadequate-change-control</guid>
      <description>
  
CSA’s Top Threats to Cloud Computing Deep Dive 2025 reflects on eight recent real-world security breaches. The report presents the narrative of each incident, as well as the relevant cloud security risks and mitigations. Today we’re taking a closer look at the second incident covered in the Deep Dive: Football Australia 2024.

&amp;nbsp;


Cybernews researchers identified plaintext keys encoded in the source of Football Australia’s website. This was clearly the result of human error, whether ...</description>
    </item>
    <item>
      <title>Ransomware in the Education Sector</title>
      <pubDate>Wed, 04 Jun 2025 10:20:52 -0700</pubDate>
      <link>https://cloudsecurityalliance.org/articles/ransomware-in-the-education-sector</link>
      <guid>https://cloudsecurityalliance.org/articles/ransomware-in-the-education-sector</guid>
      <description>
  





Originally published by Vali Cyber.

Written by&amp;nbsp;Chris Goodman.

&amp;nbsp;

In recent years, educational institutions have been relentlessly targeted by cyberattacks, with hypervisor vulnerabilities standing out as one of the most critical risks. As remote learning has expanded, academic IT infrastructures have grown rapidly—introducing new risks. Hypervisors, which virtualize servers, networks, and applications, are essential for managing digital services, especially as universitie...</description>
    </item>
    <item>
      <title>When Good GPTs Go Bad: How Trusted AI Tools Are Exploited for Attacks</title>
      <pubDate>Wed, 04 Jun 2025 09:51:10 -0700</pubDate>
      <link>https://cloudsecurityalliance.org/articles/when-good-gpts-go-bad-how-trusted-ai-tools-are-exploited-for-attacks</link>
      <guid>https://cloudsecurityalliance.org/articles/when-good-gpts-go-bad-how-trusted-ai-tools-are-exploited-for-attacks</guid>
      <description>
  




Originally published by Abnornal.

Written by Callie Baron.

&amp;nbsp;

Malicious AI is rewriting the rules of cybercrime. Learn how traditional GPTs are being exploited and why security teams need to act now.


Artificial intelligence is changing everything—fast. What once felt like science fiction is now part of daily life, unlocking new efficiencies and driving rapid innovation. At the heart of this revolution are large language models (LLMs), and particularly generative pre-trained t...</description>
    </item>
    <item>
      <title>In the Beginning, Before Zero Trust</title>
      <pubDate>Tue, 03 Jun 2025 19:08:59 -0700</pubDate>
      <link>https://cloudsecurityalliance.org/articles/in-the-beginning-before-zero-trust</link>
      <guid>https://cloudsecurityalliance.org/articles/in-the-beginning-before-zero-trust</guid>
      <description>
  
Written by&amp;nbsp;Christer Swartz, Director Industry Solutions, Illumio.

&amp;nbsp;

I entered the cyber industry a long time ago, when I joined a small startup, way back in the year 1989. Back then, our global headcount was 50 people, and we called ourselves cisco systems (when “Cisco” was still spelled with a lower-case letter “c,” and before “systems” was dropped from the name). Back in this ancient time, we made all of 3 products: a router (which we also called a “gateway”), a bridge (befo...</description>
    </item>
    <item>
      <title>How Zero Trust Can Save Your Business from the Next Big Data Breach</title>
      <pubDate>Tue, 03 Jun 2025 18:58:54 -0700</pubDate>
      <link>https://cloudsecurityalliance.org/articles/how-zero-trust-can-save-your-business-from-the-next-big-data-breach</link>
      <guid>https://cloudsecurityalliance.org/articles/how-zero-trust-can-save-your-business-from-the-next-big-data-breach</guid>
      <description>
  

Written by&amp;nbsp;Bhavya Jain.

&amp;nbsp;

A data breach refers to any incident where sensitive or confidential information—like login credentials, banking details, or private corporate files—is accessed, leaked, or stolen by unauthorized parties. Such incidents can arise from cyberattacks like phishing, malware infections, careless employee actions, or vulnerabilities in an organization’s security setup.

The growing dependence on cloud infrastructure and remote connectivity is reshaping dig...</description>
    </item>
    <item>
      <title>Make Tech Changes Fun for End Users and Off-the-Chart Adoption Will Follow</title>
      <pubDate>Tue, 03 Jun 2025 18:51:57 -0700</pubDate>
      <link>https://cloudsecurityalliance.org/articles/make-tech-changes-fun-for-end-users-and-off-the-chart-adoption-will-follow</link>
      <guid>https://cloudsecurityalliance.org/articles/make-tech-changes-fun-for-end-users-and-off-the-chart-adoption-will-follow</guid>
      <description>
  
Originally published by CXO REvolutionaries.

Written by&amp;nbsp;Jay Patty, CTO in Residence, Zscaler.

&amp;nbsp;

Inject humor and creativity into your communications strategy to smooth changes.


Technology changes are inevitable, but user adoption isn’t. Your IT team&amp;nbsp;likely struggles to get employees to react to announcements about system upgrades, security enhancements, or new authentication processes, let alone even read them. Email blasts and dry technical memos simply don’t cut it a...</description>
    </item>
  </channel>
</rss>
