| How to Prevent the Top 11 Threats in Cloud Computing | TechRepublic | August 06, 2019 |
| Cloud Security Alliance Survey Lists Cause of Capital One Breach Amid Top Security Threats | Inside CyberSecurity | August 06, 2019 |
| Top Cloud Threats List: It Goes to Eleven | Channelnomics | August 06, 2019 |
| Inside CybersecurityCLOUDSEC Hong Kong 2019 Helps Enterprises to Picture Cybersecurity | Business Insider | August 05, 2019 |
| The First-ever Cybersecurity Women of the Year Awards | Security Systems News | August 01, 2019 |
| 700 Companies Signed Up for this Free IT Asset Inventory Tool on Day #1 | Computer Business Review | August 01, 2019 |
| Capital One's Huge Hack Highlights Cloud Security Risks | Colorado Springs Business Journal | July 30, 2019 |
| Qualys Makes IT Asset Discovery and Inventory App Available for free | BetaNews | July 29, 2019 |
| Find Out What’s on Your Network with Free Qualys Global Asset Discovery and Inventory App | Techspective | July 29, 2019 |
| Debunking Five Myths in Cloud Security | CISO MAG | July 29, 2019 |
| Don't fall into the trap of thinking you're safe and secure in the cloud. It could become a right royal pain in the SaaS | The Register | July 25, 2019 |
| The Infosec Industry Comes Together to Recognize Innovators and Leaders at the First-Ever Cybersecurity Women of the Year Awards | Dark Reading | July 25, 2019 |
| SAFE-T; A Progressive Approach To Zero Trust Access | Security Boulevard | July 23, 2019 |
| Banking, AI and security - how to improve collaboration | SC Magazine UK | July 01, 2019 |
| Women in Security: Women of Influence | SC Magazine | July 01, 2019 |
| Cloud Security Alliance releases new model to assist cloud computing risk assessment | Continuity Central | June 26, 2019 |
| 5 Cloud Security Concerns That Still Keep Cybersecurity Pros Up at Night | Security Boulevard | June 26, 2019 |
| What are the top cloud security certifications for 2019? | TechTarget | June 26, 2019 |
| Here Is the Secret Behind Getting That Cloud Computing Job | Analytics Insight | June 22, 2019 |
| Software Defined Perimeter (SDP): The deployment | Network World | June 21, 2019 |