| Cloud Security Alliance offers tips for using a customer controlled key store | SC Magazine | September 27, 2022 |
| Cyber paradox: Security looms as obstacle and opportunity in cloud migration | CIO Dive | September 26, 2022 |
| 6 Healthcare Cybersecurity, Operational Strategies For Successful CISOs | Health IT Security | September 26, 2022 |
| How SaaS Is Redefining Cybersecurity | Forbes | September 19, 2022 |
| Academic Advice: Certification courses in emerging tech may get you lucrative jobs | Education Times | September 19, 2022 |
| How to Build Your Cloud Migration Security Strategy | Kroll | September 16, 2022 |
| The cyber security skills your business needs | IT Pro | September 16, 2022 |
| Your Organization Has Cloud Sprawl | Security Boulevard | September 15, 2022 |
| Avoiding inertia with 7 steps to a zero trust architecture | Tech Native | September 15, 2022 |
| What to look out for at Cyber Security & Cloud Expo Europe: Philips, Capital One, ING and more | CloudTech | September 15, 2022 |
| Implementing and managing cloud security compliance | SC Magazine | September 15, 2022 |
| Interest in cloud security automation grows | Barracuda Networks | September 14, 2022 |
| Implement Cloud Security Tools Now, Not Later | Security Boulevard | September 13, 2022 |
| FS-ISAC 2022: Cloud Security for Financial Services | Security Boulevard | September 13, 2022 |
| 11 questions to ask vendors at GSX 2022 | SecurityInfoWatch | September 12, 2022 |
| SOC Analyst: A Good Way to Enter the Cybersecurity Field | Dice | September 12, 2022 |
| The Importance of Standards in the IT Security Industry | Kuppinger Cole | September 12, 2022 |
| GRU-backed cyberattacks: What they are, how to defend against them | SC Magazine | September 09, 2022 |
| 3 ways to fight cloud sprawl | Security Magazine | September 06, 2022 |
| How Secure Is Microsoft Teams? – UC Today | Inferse | September 05, 2022 |