| CSA aims to give startups a leg-up in cloud security with new report | Cloud Tech News | November 20, 2017 |
| 10 cloud mistakes that can sink your business | CIO Australia | November 14, 2017 |
| The Top 12 ‘Real’ #CyberSecurity Threats | CSO Australia | November 10, 2017 |
| SecureWorld conference in Bellevue to discuss cybersecurity | Bellevue Reporter | November 07, 2017 |
| The Basics of The CSA’s Cloud Controls Matrix | Uzado's Blog | November 06, 2017 |
| How shared cloud security assessments can benefit enterprises | Tech Target | November 01, 2017 |
| How to secure a software-driven technology stack in a cloud of moving parts | The Register | November 01, 2017 |
| IoT- Identity Access Management Market to Contemplate Colossal Escalation in The Forecasted Period 207-2022 | Herald Keeper | October 30, 2017 |
| Cloud Security Alliance Releases Updates to 'The Treacherous 12: Cloud Computing Top Threats in 2016' | New Kerala | October 28, 2017 |
| The cyber security skills your business needs | ITPro | October 27, 2017 |
| Software Defined Perimeter (SDP) Market Overview 2022: Key Developments, Supply Chain Trends, Financials and Recent Developments | Daily News KS | October 25, 2017 |
| Getting enterprise-scale cloud security right | Computer Business Review | October 24, 2017 |
| Cloud Security: Beware the 'Treacherous 12' | Enterprise Cloud News | October 20, 2017 |
| ‘Treacherous 12’ Cloud Security Threats: Is Your Company Exposed? | SDXCentral | October 20, 2017 |
| Cloud Security Alliance Updates 'Top Threats to Cloud Computing' List | eWeek | October 20, 2017 |
| The ‘treacherous 12’: Top threats to cloud computing revealed. | Security Brief Europe | October 20, 2017 |
| Cloud Confident: How to Run an Organization on Many Clouds and Secure All of Them | Forbes | October 16, 2017 |
| Real words or buzzwords?: True Cloud - Part 3 | SecurityInfoWatch | October 10, 2017 |
| Sloppy Business Behavior to Blame for Cloud Security Leaks, Survey Reveals | Security Intelligence | October 10, 2017 |
| 8 ways to identify and measure security threats | Health Data Management | October 05, 2017 |