| Interest in cloud security automation grows | Barracuda Networks | September 14, 2022 |
| Implement Cloud Security Tools Now, Not Later | Security Boulevard | September 13, 2022 |
| FS-ISAC 2022: Cloud Security for Financial Services | Security Boulevard | September 13, 2022 |
| 11 questions to ask vendors at GSX 2022 | SecurityInfoWatch | September 12, 2022 |
| SOC Analyst: A Good Way to Enter the Cybersecurity Field | Dice | September 12, 2022 |
| The Importance of Standards in the IT Security Industry | Kuppinger Cole | September 12, 2022 |
| GRU-backed cyberattacks: What they are, how to defend against them | SC Magazine | September 09, 2022 |
| 3 ways to fight cloud sprawl | Security Magazine | September 06, 2022 |
| How Secure Is Microsoft Teams? – UC Today | Inferse | September 05, 2022 |
| Today's threats, tomorrow's skill sets? | Teiss | August 30, 2022 |
| Securing identities in the cloud: two new studies reveal the state of play | List23 | August 29, 2022 |
| Securing identities in the cloud: 2 new studies give us the state of play | Venture Beat | August 29, 2022 |
| Week in review: RCE bug in GitLab patched, phishing PyPI users, Escanor malware in MS Office docs: How vulnerable supply chains threaten cloud security | HelpNet Security | August 28, 2022 |
| How DevSecOps Empowers Citizen Developers | Dark Reading | August 26, 2022 |
| Regulatory Implications from 2019 Capital One Hack and Recent Conviction of Former AWS Engineer | JD Supra | August 26, 2022 |
| Zero-Trust: How SOC 2 Compliance Can Help | Security Boulevard | August 23, 2022 |
| Facing the New Security Challenges That Come With Cloud | Dark Reading | August 23, 2022 |
| IT Pros Trust Open Frameworks and Clouds Over Third Parties | The New Stack | August 22, 2022 |
| The use of outdated infrastructure hinders the ability of organizations to protect their employees | NewsDubai | August 20, 2022 |
| Cloud-based breaches primarily affected third parties and suppliers in 2021 | Techx | August 20, 2022 |