Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Cloud Security Alliance

Below you will find reports with the source of “Cloud Security Alliance”

image from The State of Non-Human Identity Security

The State of Non-Human Identity Security

Non-human identities (NHIs) such as bots, API keys, service accounts, OAuth tokens, and secrets are indispensable for automating tasks, enhancing efficiency, and driving innovation within organizations. The survey provides insights into their opinions about their current NHI security, the obstacles they’re facing, and the strategies and tools they’re using. The aim is to shed light on the current state of NHI security and identify areas for improvement.

(more available)
Added: September 16, 2024
image from The Annual SaaS Security Survey Report

The Annual SaaS Security Survey Report

Adaptive Shield commissioned CSA to develop a survey and report to better understand the industry’s knowledge, attitudes, and opinions regarding SaaS application use, SaaS security policies and processes, SaaS threats, and SaaS security strategy/solutions. Adaptive Shield financed the project and co-developed the questionnaire with CSA research analysts. The survey was conducted online by CSA in March of 2023 and received 1130 responses from IT and security professionals from organizations of various sizes and locations. CSA’s research analysts performed the data analysis and interpretation for this report.

(more available)
Added: August 3, 2023
image from State of Financial Service in Cloud

State of Financial Service in Cloud

The Financial Services Industry (FSI) adoption of cloud services has grown extensively in recent years and is expected to increase with further adoption and integration of cloud service provider (CSP) functions replacing traditional technology of banking, commerce, and other methods of performing financial transactions and exchanging financial data. The intention of this report was to evaluate the current state of adoption, compared to the industry’s readiness just three years ago when CSA conducted a similar survey and identify the current issues and opportunities that FSI leaders are addressing in their progression to further utilizing cloud services.

(more available)
Added: August 3, 2023
image from Security Implications of ChatGPT

Security Implications of ChatGPT

This paper aims to provide a high-level overview of the implications of ChatGPT in the cybersecurity industry, without delving into the granular details of artificial intelligence. We will explore the key concepts and domains that are crucial for understanding ChatGPT’s capabilities, as well as the potential impact on businesses.

(more available)
Added: August 3, 2023
image from Security-Enabled Innovation and Cloud Trends

Security-Enabled Innovation and Cloud Trends

Expel commissioned CSA to develop a survey and report to understand better the industry’s knowledge, attitudes, and opinions regarding security’s relationship to innovation, outcomes of security-enabled innovation, and trends in cloud use. Expel financed the project and co-developed the questionnaire with CSA research analysts. The survey was conducted online by CSA in May of 2023 and received 1018 responses from IT and security professionals from organizations of various sizes and locations. CSA’s research analysts performed the data analysis and interpretation for this report.

(more available)
Added: August 3, 2023
image from 2022 SaaS Security Survey Report

2022 SaaS Security Survey Report

The goal of this survey was to understand the current state of SaaS security and misconfigurations. The survey was conducted online by CSA from January to February 2022 and received 340 responses from IT and security professionals from various organization sizes and locations. CSA’s research team performed the data analysis and interpretation for this report.

(more available)
Added: May 19, 2022
image from Survey Report: Evolution of the CASB

Survey Report: Evolution of the CASB

A survey-driven report of over 200 IT and security professionals on the practices and the objectives in their use of cloud access security broker (CASB) technologies.

(more available)
Added: August 21, 2020
image from The Impact Of Cloud On ERP

The Impact Of Cloud On ERP

The “Impact of Cloud on ERP” survey report was designed to assess the impact of ERP solutions on organizations and better understand cloud preparation and data migration needs to implement ERP solutions in the cloud. Features and benefits gained, security and privacy challenges, and time to deploy for an ERP Solution in a cloud environment were explored.

(more available)
Added: January 15, 2019
image from State Of Cloud Security 2018

State Of Cloud Security 2018

This paper provides insights into some of the latest cloud practices and technologies enterprise information security practitioners must be aware of as IT and sensitive data extends beyond the traditional corporate perimeter.

(more available)
Added: October 17, 2018
image from Treacherous 12: Cloud Computing Top Threats In 2016

Treacherous 12: Cloud Computing Top Threats In 2016

While there are many security concerns in the cloud, this report focuses on 12 specifically related to the shared, on-demand nature of cloud computing. To identify the top concerns, CSA conducted a survey of industry experts to compile professional opinions on the greatest security issues within cloud computing. The Top Threats working group used these survey results alongside their expertise to craft the final 2016 report.

(more available)
Added: October 17, 2018
image from Top Threats To Cloud Computing: Deep Dive

Top Threats To Cloud Computing: Deep Dive

This case study attempts to connect all the dots when it comes to security analysis by using nine anecdotes cited in the top threat’s for its foundation. Each of the nine examples are presented in the form of (1) a reference chart and (2) a detailed narrative. The reference chart’s format provides an attack-style synopsis of the actor, spanning from threats and vulnerabilities to end controls and mitigations. They encourage architects and engineers to use this information as a starting point for their own analysis and comparisons.

(more available)
Added: October 16, 2018
image from The Cloud Balancing Act for IT: Between Promise and Peril

The Cloud Balancing Act for IT: Between Promise and Peril

This paper is put together by a not-for-profit organization with a mission to promote the use of best practices for providing security assurance within Cloud Computing, and to provide education on the uses of Cloud Computing to help secure all other forms of computing.

(more available)
Added: October 15, 2018
© Cyentia Institute 2025
Library updated: July 4, 2025 00:08 UTC (build b1d7be4)