News

In 2023, a threat actor launched a social engineering campaign on Retool involving smishing & credential harvesting, leading ...
Today, CSA is releasing the official mapping of the AI Controls Matrix (AICM v1.0) to ISO/IEC 42001:2023—with companion ...
Email attacks on financial services rose 25% year-over-year. Learn why FinServ is a top target and how threat actors exploit ...
Why do manual identity workflows continue to exist, when the consequences of getting them wrong are so serious and when ...
Agentic AI gives AI the ability to take action, not just respond to prompts. Get a step-by-step explanation of how ...
TIQ Time helps lawyers build a complete and consistent timesheet, helping firms to reduce leakage, increase their bottom-line and optimise insights and transparency in service delivery.
Steer clear of the dangers of oversharing on social media. This blog offers examples of what can go wrong and easy-to-follow steps on how to do things right.
Written by Derek Hammack, VP, Operations and Customer Success, CheckRed. Cybercriminals are getting smarter—and stealthier. One of the most dangerous and overlooked threats to your brand is ...
This document is designed for assessment firms participating in CSA’s STAR Certification or Attestation program. It provides a strategic, practical guide for firms looking to effectively upsell STAR ...
QR codes promise convenience, but most people don’t realize the sheer ease with which those codes can be weaponized. Learn more about the new “quishing” threat.
STAR Registry Listing for ZainTECH CloudHub FZ-LLC Founded in 2013 by the Cloud Security Alliance, the Security Trust Assurance and Risk (STAR) registry encompasses key principles of transparency, ...
Founded in 2013 by the Cloud Security Alliance, the Security Trust Assurance and Risk (STAR) registry encompasses key principles of transparency, rigorous auditing, and cloud security and privacy best ...