| Daily Briefing V11 Issue 133 | The CyberWire | July 13, 2022 |
| Building A Strong Cloud Security Posture | Forbes | July 12, 2022 |
| How Confidential Computing Locks Down Data, Regardless of Its State | Dark Reading | July 12, 2022 |
| CSA announces the launch of their Zero Trust Advancement Center and how it can help play a role in protecting IoT, IIoT and ICS systems, Podcast | Telecom Reseller | July 12, 2022 |
| Hacking the cloud: why APIs are now a top threat | IDG | July 11, 2022 |
| The History and Evolution of Zero Trust | SecurityWeek | July 11, 2022 |
| 3 Access Security Lessons Learned from the Marriott Data Breach | Security Boulevard | July 10, 2022 |
| 11 top cloud security threats | CSO Online | July 05, 2022 |
| John Kindervag joins Cloud Security Alliance as Security Advisor | IT Security News | July 03, 2022 |
| Quantum hacking is the next big cybersecurity threat. Here’s how companies should prepare for ‘Y2Q’ | Yahoo!Finance | July 01, 2022 |
| GRC Roundup – June 2022 | What’s New in Governance, Risk, and Compliance? | MetricStream | July 01, 2022 |
| Best of Both Worlds: Securing All Parts of the Hybrid Cloud | BizTech Magazine | July 01, 2022 |
| John Kindervag joins Cloud Security Alliance as Security Advisor | Help Net Security | July 01, 2022 |
| Top Cloud Security Standards to Leverage for Your Business | TechGenix | July 01, 2022 |
| Key takeaways from CSA’s SaaS Governance Best Practices guide | CSO Online | June 30, 2022 |
| Cloud Security Alliance and Cyber Risk Institute develop CCM addendum for the financial sector | HelpNet Security | June 30, 2022 |
| Key takeaways from CSA’s SaaS Governance Best Practices guide | CSO Online | June 30, 2022 |
| Cloud Security Alliance and Cyber Risk Institute develop CCM addendum for the financial sector | HelpNet Security | June 30, 2022 |
| Cloud Security Resources and Guidance | Cisco | June 29, 2022 |
| Cloud security risks remain very human | InfoWorld | June 29, 2022 |