| Unless Your ID Cloud Vendor Can Fulfill These 5 Requirements, Proceed With Caution | Security Boulevard | June 21, 2022 |
| Ways to Master Cloud Computing | CxO Today | June 21, 2022 |
| Report identifies most frequently encountered cloud security risks | SC Magazine | June 21, 2022 |
| New Survey from Cloud Security Alliance and Google Finds Cloud | SC Magazine | June 21, 2022 |
| Cyber Defense: Kai Roer On The 5 Things Every American Business Leader Should Do To Shield Themselves From A Cyberattack | Authority Magazine | June 21, 2022 |
| Ways to Master Cloud Computing | Newslanes | June 21, 2022 |
| How Can We Fill the Cybersecurity Education Gap? | GovInfoSecurity | June 20, 2022 |
| CSA identifies top 11 cloud security impediments | Barracuda Networks Blog | June 20, 2022 |
| Week in review: Microsoft fixes Follina, cybersecurity pros quitting, (IN)SECURE Magazine RSAC 2022 | Cloud computing top concerns: The focus is shifting | HelpNet Security | June 19, 2022 |
| Zero Trust: Hype vs. Reality | eSecurity Planet | June 17, 2022 |
| Why your SaaS configurations are putting you at risk | Tech Beacon | June 17, 2022 |
| Heightened Cybersecurity Awareness | Journal of Healthcare Contracting | June 17, 2022 |
| A SaaS evaluation checklist to choose the right provider | Tech Target | June 16, 2022 |
| Firewalls and the Plateau of Productivity | Security Boulevard | June 16, 2022 |
| Can Your Enterprise Cybersecurity Solution Solve These Two Challenges? You May Be More Vulnerable Than You Realize | Security Boulevard | June 16, 2022 |
| Cloud computing top concerns: The focus is shifting | DailyAdvent | June 15, 2022 |
| Cloud computing top concerns: The focus is shifting | IT Security News | June 15, 2022 |
| Cybersecurity Professionals Identify Top Cloud Computing Security Risks | Health IT Security | June 15, 2022 |
| Cloud computing top concerns: The focus is shifting | HelpNet Security | June 15, 2022 |
| Cloud adopters are the ‘weak link’ in security | GCN | June 14, 2022 |