| Cloud Security Alliance Congress | MIS Training Institute | June 28, 2010 |
| THE CLOUD SECURITY ALLIANCE SUMMIT | Black Hat | June 28, 2010 |
| Three things we'd like to see from new Motorola Droid | Security World | June 17, 2010 |
| Cloud security: The basics | Network World | June 15, 2010 |
| The top 7 security threats to cloud computing | Large Enterprise Business | June 12, 2010 |
| To Cloud or not to Cloud, Better Yet, What is a Cloud? | The Virtualization Practice | June 09, 2010 |
| Cloud Security, Some Guidance | No Jitter Blog | June 09, 2010 |
| Cloud security: Try these techniques now | Computerworld | June 07, 2010 |
| CIS Series. Jim Reavis: Securing the cloud | Pink Identity | June 07, 2010 |
| Seven deadly sins of cloud security | Private Cloud | June 07, 2010 |
| The Dangers of Cloud Computing | Nework World | May 28, 2010 |
| The Real Problem with SaaS Security | Trusted Cloud | May 26, 2010 |
| Six Misconceptions About Cloud Apps | Trusted Cloud | May 25, 2010 |
| Head in the Clouds: DoD Turns to Cloud Computing | Defense Industry Daily | May 25, 2010 |
| Cloud Security Concerns, Best Practices | GCN | May 24, 2010 |
| Identity, data management crucial to cloud success | GCN | May 21, 2010 |
| Cloud computing expected to improve security | Security Watch | May 20, 2010 |
| Ottankan Alliance | ZDNet | May 18, 2010 |
| Data In A Cloud? Keep Feet On The Ground | Investors.com | May 17, 2010 |
| Seven Deadly Sins of Cloud Security | CIO | May 17, 2010 |