| CLOUD SECURITY ALLIANCE 2020 HIGHLIGHTS | Journal of Cyber Policy | February 25, 2020 |
| Next Cloud Security Challenge: Containers and Kubernetes | Gov Info Security | February 24, 2020 |
| Government Vs. Private Sector in the New Digital Reality | Journal of Cyber Policy | February 24, 2020 |
| #RSAC: Realize the Harms and Benefits of Technology and Create Policies to Enable the Public | Infosecurity Magazine | February 24, 2020 |
| #RSAC: Make Security a Business and a Technical Issue | Infosecurity Magazine | February 24, 2020 |
| Best Practices for Ensuring Data Security in the Cloud | EdTech Magazine | February 18, 2020 |
| The demise of the perimeter and the rise of the security platform | ITProPortal | February 17, 2020 |
| Cloud visibility a top concern ahead of RSA Conference 2015 | SearchCloudSecurity | February 12, 2020 |
| Expert: Security automation can thwart attacks on cloud computing | SearchCloudSecurity | February 12, 2020 |
| Here’s One of Amazon’s Biggest Weak Spots | CEOTodayMagazine.com | February 11, 2020 |
| 7 best practices for managing a multi-cloud environment | NetworkWorld | February 04, 2020 |
| How to Conquer the Cybersecurity Challenges of the Cloud? | ProfessionalHackers.in | February 03, 2020 |
| Three Critical Considerations for Data Protection in 2020 | Towards Data Science | February 03, 2020 |
| Is your city doing enough to protect against cyberattacks? (Survey says probably not) | Smart Cities Council | February 02, 2020 |
| A Planner’s Realistic Guide to Cloud Data Security | Communal News | January 24, 2020 |
| 5 ways to boost your cloud security practices | ExpertIP | January 23, 2020 |
| The TWELFTH Annual Disaster Recovery Breakfast: (IM)MATURITY | Security Boulevard | January 20, 2020 |
| Six BIG changes to expect for compliance in the year ahead | SC Magazine UK | January 16, 2020 |
| Fake Cybersecurity Certifications to Avoid | Inventiva | January 15, 2020 |
| Cloud Sprawl? Here Is a Two-Step Remedy | EC-Council Blog | January 15, 2020 |