| IT teams can't fully utilize cloud security solutions due to understaffing | Business Telegraph | October 17, 2022 |
| Vendor trust factor: Less than zero | Protocol | October 17, 2022 |
| IT teams can't fully utilize cloud security solutions due to understaffing | TechRadar | October 17, 2022 |
| Why security teams are losing trust in the term 'zero trust' | Protocol | October 17, 2022 |
| DUE TO A LACK OF STAFF, IT DEPARTMENTS CANNOT FULLY UTILISE CLOUD SECURITY SOLUTIONS | Best Gaming Pro | October 17, 2022 |
| 5 challenges to public cloud security | SC Magazine | October 14, 2022 |
| How to choose the best ZTNA vendor for your organization | TechTarget | October 11, 2022 |
| Securing the Cloud With a Digital Trust Approach | CPO Magazine | October 11, 2022 |
| Six security warning signs to look out for when choosing the right cloud storage solution | Torres News | October 10, 2022 |
| Definition: cloud service provider (cloud provider) | TechTarget | October 07, 2022 |
| Adopting Zero Trust With Maureen Rosado: Selling Zero Trust | Security Boulevard | October 06, 2022 |
| Risk Impacts of SaaS Cloud Computing | CPA Journal | October 05, 2022 |
| Top zero-trust certifications, training for IT pros | TechTarget | October 05, 2022 |
| Blocking Access to Confidential Data | Newslanes | October 04, 2022 |
| Blocking Access to Confidential Data | Security Boulevard | October 04, 2022 |
| The 3 Biggest Information Security Management Challenges for Leaders in 2022 | EC-Council Cybersecurity Exchange | October 04, 2022 |
| Today’s Threats, Tomorrow’s Skill Sets? | Security Boulevard | October 03, 2022 |
| Cloudflare’s post-quantum cryptography protects almost a fifth of the internet | VentureBeat | October 03, 2022 |
| Foundational Activities for Secure Software Development | Tripwire | October 02, 2022 |
| NUVOLA: the new Cloud Security tool | Security Affairs | September 28, 2022 |