| Risk Impacts of SaaS Cloud Computing | CPA Journal | October 05, 2022 |
| Top zero-trust certifications, training for IT pros | TechTarget | October 05, 2022 |
| Blocking Access to Confidential Data | Newslanes | October 04, 2022 |
| Blocking Access to Confidential Data | Security Boulevard | October 04, 2022 |
| The 3 Biggest Information Security Management Challenges for Leaders in 2022 | EC-Council Cybersecurity Exchange | October 04, 2022 |
| Today’s Threats, Tomorrow’s Skill Sets? | Security Boulevard | October 03, 2022 |
| Cloudflare’s post-quantum cryptography protects almost a fifth of the internet | VentureBeat | October 03, 2022 |
| Foundational Activities for Secure Software Development | Tripwire | October 02, 2022 |
| NUVOLA: the new Cloud Security tool | Security Affairs | September 28, 2022 |
| Cloud Security Alliance offers tips for using a customer controlled key store | SC Magazine | September 27, 2022 |
| Cyber paradox: Security looms as obstacle and opportunity in cloud migration | CIO Dive | September 26, 2022 |
| 6 Healthcare Cybersecurity, Operational Strategies For Successful CISOs | Health IT Security | September 26, 2022 |
| How SaaS Is Redefining Cybersecurity | Forbes | September 19, 2022 |
| Academic Advice: Certification courses in emerging tech may get you lucrative jobs | Education Times | September 19, 2022 |
| How to Build Your Cloud Migration Security Strategy | Kroll | September 16, 2022 |
| The cyber security skills your business needs | IT Pro | September 16, 2022 |
| Your Organization Has Cloud Sprawl | Security Boulevard | September 15, 2022 |
| Avoiding inertia with 7 steps to a zero trust architecture | Tech Native | September 15, 2022 |
| What to look out for at Cyber Security & Cloud Expo Europe: Philips, Capital One, ING and more | CloudTech | September 15, 2022 |
| Implementing and managing cloud security compliance | SC Magazine | September 15, 2022 |