| Nine Network Security Topics Grabbing Headlines in Q1 2020 | Security Boulevard | March 17, 2020 |
| RSA 2020 Conference Recap: 7 Conference Observations from the Floor | Security Boulevard | March 10, 2020 |
| Better Apps and Better Security When You Shift Left | DevOps.com | March 10, 2020 |
| The New Insider Risk: When Creativity Goes Bad | Data Breach Today | March 06, 2020 |
| INSIGHT: Compliance Officers Must Ensure Collaboration Platforms Meet FINRA, SEC Rules | Bloomberg News | March 04, 2020 |
| Keeping Customer Data Secure in the Cloud: 5 Things to Know | Security Boulevard | March 03, 2020 |
| 5 Considerations for Building a Zero Trust IT Environment | HelpNet Security | March 02, 2020 |
| How Security Leaders at Starbucks and Microsoft Prepare for Breaches | Dark Reading | March 02, 2020 |
| How to Prevent an AWS Cloud Bucket Data Leak | Dark Reading | February 26, 2020 |
| CLOUD SECURITY ALLIANCE 2020 HIGHLIGHTS | Journal of Cyber Policy | February 25, 2020 |
| Next Cloud Security Challenge: Containers and Kubernetes | Gov Info Security | February 24, 2020 |
| Government Vs. Private Sector in the New Digital Reality | Journal of Cyber Policy | February 24, 2020 |
| #RSAC: Realize the Harms and Benefits of Technology and Create Policies to Enable the Public | Infosecurity Magazine | February 24, 2020 |
| #RSAC: Make Security a Business and a Technical Issue | Infosecurity Magazine | February 24, 2020 |
| Best Practices for Ensuring Data Security in the Cloud | EdTech Magazine | February 18, 2020 |
| The demise of the perimeter and the rise of the security platform | ITProPortal | February 17, 2020 |
| Cloud visibility a top concern ahead of RSA Conference 2015 | SearchCloudSecurity | February 12, 2020 |
| Expert: Security automation can thwart attacks on cloud computing | SearchCloudSecurity | February 12, 2020 |
| Here’s One of Amazon’s Biggest Weak Spots | CEOTodayMagazine.com | February 11, 2020 |
| 7 best practices for managing a multi-cloud environment | NetworkWorld | February 04, 2020 |