CSA’s CCZT is a comprehensive training and certificate program for Zero Trust. CCZT is your on-ramp to becoming an accredited ...
Explainable AI (XAI): Techniques like Local Interpretable Model-Agnostic Explanations (LIME) allow us to understand how GenAI ...
Four vulnerabilities have been discovered that target Docker container environments: CVE-2024-21626, CVE-2024-23651, CVE-2024-23652, and CVE-2024-23653.
Written by Michael St.Onge, Principal Security Architect, Tamnoon. Smooth remediation requires meticulous coordination across tools, teams, and schedules. The complexity and scale of the remediation ...
This group aims to benefit all parties in the Software-as-a-Service (SaaS) ecosystem by supporting a common understanding of SaaS related risks from the perspectives of the cloud customer and cloud ...
This working group hopes to develop a platform for CSPs to publish their security requirements; for security vendors to share their security products and services, and to provide a platform for ...
Are you a research volunteer? Request to have your profile displayed on the website here.
In order to address the gap in industry best practices for cloud components, this working group proposes to develop internationally recognized technical security specifications for cloud components.
The Enterprise Resource Planning (ERP) working group seeks to develop best practices to enable organizations that run their business on large ERP implementations, such as SAP or Oracle applications, ...
The goal of this group is to develop security guidance to encourage cloud providers, asset owners and device manufacturers towards adopting best practices to secure industrial control systems. We ...