AI Hallucinations: The Emerging Market for Insuring Against Generative AI's Costly Blunders
Cloud Security Alliance
by
2d ago
Written by MJ Schwenger, Co-Chair of the CSA AI Governance and Compliance Working Group.Generative AI: Embracing Hallucinations for Responsible InnovationThis blog delves into the fascinating world of Generative AI (GenAI), acknowledging its revolutionary potential while addressing the inherent challenge of "hallucinations." It explores the technical underpinnings of these hallucinations and proposes a nuanced perspective, shifting the focus from criticizing AI to fostering collaborative inte ..read more
Visit website
Understanding the Nuances: Privacy and Confidentiality
Cloud Security Alliance
by
2d ago
Originally published by MJD.Written by Shonda Knowles Elliott, CPA.In the digital age, where data is the new currency, businesses must prioritize the security and integrity of their clients' information. To demonstrate this, many organizations adhere to frameworks like SOC 2 (System and Organization Controls), developed by the American Institute of CPAs (AICPA). SOC 2 reports provide an independent auditor’s opinion on the design and operating effectiveness of a company’s information security ..read more
Visit website
What’s in a Name? Defining Zero Trust for Leaders
Cloud Security Alliance
by
2d ago
Originally published by CXO REvolutionaries.Written by Nat Smith, Senior Director, Product Management, Zscaler.Could you accurately and succinctly describe zero trust to your leadership team or board? During my five years as a VP analyst at Gartner, I witnessed executives struggle to convey the concept in business language, and it’s not entirely their fault; “Zero trust” rolls out the red carpet for misinterpretation and misrepresentation.Zero trust is a model for secure resource access. Gart ..read more
Visit website
‘Leaky Vessels’ Docker Vulnerabilities Found in Many Cloud Environments: RunC (60%) and BuildKit (28%)
Cloud Security Alliance
by
2d ago
Originally published by Orca Security. Written by Roi Nisimi.On January 31st, Snyk unveiled the discovery of four novel container vulnerabilities that target the runC and BuildKit components within Docker container environments. The vulnerabilities were assigned CVEs with CVSS scores ranging from 8.6 to 10: CVE-2024-21626 in runC, and CVE-2024-23651, CVE-2024-23652, and CVE-2024-23653 in BuildKit. While no active exploits have been detected yet, these vulnerabilities pose a significant risk b ..read more
Visit website
Neutralizing the Threat with Cloud Remediation
Cloud Security Alliance
by
2d ago
Originally published by Tamnoon. Written by Michael St.Onge, Principal Security Architect, Tamnoon. Smooth remediation requires meticulous coordination across tools, teams, and schedules. The complexity and scale of the remediation process may suggest that only a manual or an automated process can deal with it. Ideally, an organization can leverage the best of each process where appropriate. With so many different dimensions to coordinate, intricate planning and cross-functional excellence is ..read more
Visit website
Are You Ready for Microsoft Copilot?
Cloud Security Alliance
by
6d ago
Originally published by Reco.Written by Gal Nakash.On March 14, Microsoft made Copilot available to customers in their 365 environment. Originally designed to enable productivity, Copilot is an AI chatbot that allows any user to conduct research or create content. It has the ability to generate slide decks, create text in word files, analyze spreadsheets and more. It’s powerful. ‍Shared Organizational Data Is Now at Risk of Data LeakageIt also opens up new doors for threat actors to gain acce ..read more
Visit website
Implementing a Data-Centric Approach to Security
Cloud Security Alliance
by
6d ago
Written by Uday Srinivasan, CTO, Acante.We previously discussed how the modern data stack has changed the threat landscape today. In part II, below, we outline exactly how security and data teams can enable modern data teams to innovate rapidly without compromising on the security and access governance of the enterprise data.The Need: A Data-centric Approach to SecurityHistorically, the term “data security” has been largely equated with encryption and similar control measures. However, with t ..read more
Visit website
7 Common Causes of Data Breach: Safeguarding Your Digital Assets
Cloud Security Alliance
by
6d ago
Originally published by InsiderSecurity.Data Breaches are an ever-present threat to enterprises in today’s connected world. Whether you are a small SME or a large multinational company, the risk of a data breach and the company becoming another headline is a constant concern for senior management. It is not just financial loss that worries management but the loss of reputation and customer trust that can take years to recover if a data breach happens. This article reviews seven key issues tha ..read more
Visit website
How to Set Your Small Privacy Team Up for Success
Cloud Security Alliance
by
6d ago
Originally published by Schellman.Amidst the evolving patchwork of data protection and privacy legislation in the United States, privacy remains a top priority for organizations. But protecting privacy also requires resources, and while not all organizations have that much to spare, it is possible to make do with only a small, dedicated team.In this blog post, we’ll describe the common hurdles small privacy teams will face and how you can overcome them to set your organization up for long-ter ..read more
Visit website
Do You Know These 7 Terms About Cyber Threats and Vulnerabilities?
Cloud Security Alliance
by
6d ago
In today's digitally interconnected world, where cybercriminals continue to advance as technology does, understanding the landscape of cyber threats and vulnerabilities is crucial for both individuals and organizations. Below, we define seven fundamental terms and provide additional resources that will help you begin to better understand what cyber threats and vulnerabilities are and what you can do about them.1. ThreatAnything with the potential to cause harm to an information system in the ..read more
Visit website

Follow Cloud Security Alliance on FeedSpot

Continue with Google
Continue with Apple
OR