| Google Engineers Said to Refuse to Build Security Tool to Win Military Contracts | Brookville Times | August 10, 2018 |
| Top Threats to Cloud Computing: Deep Dive - Cloud Security Alliance | The Cyber Wire | August 09, 2018 |
| Top Threats to Cloud Computing: Deep Dive – Cloud Security Alliance | Journal of Cyber Policy | August 09, 2018 |
| CSA Releases Top Threats to Cloud Computing: Deep Dive | Markets Insider | August 08, 2018 |
| Black Hat USA 2018 Conference Focuses on Cyber Threats and Unique Solutions | In CyberDefense | August 07, 2018 |
| Improved Standards for Securing Medical Devices Released | InfoSecurity | August 07, 2018 |
| CSA, OWASP Issue Updated Guidance for Secure Medical Device Deployment | IT News Online | August 07, 2018 |
| Why You Should Do Your Homework Before Investing in Enterprise Blockchains | Security Intelligence | August 07, 2018 |
| 50 Best Cloud Security Training Resources | Security Boulevard | August 02, 2018 |
| Is your cloud strategy leaving your business vulnerable? | IT News Africa | August 01, 2018 |
| Master the fundamentals of cloud application security | Tech Target | July 31, 2018 |
| CIO Spotlight: James Rutt, Dana Foundation | CIO | July 27, 2018 |
| Be like a Moomin: How to establish trust between competitors so we can fight cybercrime | Security Boulevard | July 24, 2018 |
| Diane Greene focuses on Google Cloud strengths as it plays catch-up | Computer Dealer News | July 23, 2018 |
| Security as a service: 5 key considerations for IT Ops teams | Tech Beacon | July 19, 2018 |
| Japan’s New Cybersecurity Strategy: Plugging The IoT Gap – Analysis | Eurasia Review | July 19, 2018 |
| The Two Biggest Disruptions To Cybersecurity Since The Invention Of The Firewall | Forbes | July 19, 2018 |
| Early Guide to Black Hat 2018 | Security Boulevard | July 17, 2018 |
| Naver to offer cloud service to Mirae Asset Daewoo | The Korea Times | July 15, 2018 |
| Killer drones - all in a day's work for New Zealand's cyber crime fighters | New Zealand Herald | July 13, 2018 |