SC Magazine | July 01, 2019

Women in Security: Women of Influence

Network World | June 21, 2019

Software Defined Perimeter (SDP): The deployment

FedTech Magazine | June 20, 2019

How Federal Agencies Manage Their Risk in the Cloud

Security Boulevard | June 20, 2019

Who’s Responsible for a Cloud Breach? It Depends

IDG Connect | June 13, 2019

The Secret CSO: Nils Puhlmann, Twilio

Enterprise Security | June 04, 2019

Tips to Improve Cloud Provider’s Security

APAC CIO | May 30, 2019

Security and Agility in the Cloud

Security Boulevard | May 28, 2019

Is Third-Party Risk Assessment Getting Better?

Daily Mirror | May 27, 2019

Eva Chen – the high-flying visionary leader

Security Brief Asia | May 24, 2019

Hybrid cloud security big concern for business leaders

The Cyberwire | May 22, 2019

Cloud Security Complexity

The CyberWire | May 22, 2019

Daily briefing: Cloud Security Complexity

Tech Republic | May 21, 2019

How to improve cloud provider security: 4 tips

Security Boulevard | May 21, 2019

Top 4 cloud security certifications

Global Security Magazine | May 21, 2019

Cloud Security Alliance Study

Data Center Knowledge | May 21, 2019

Securing Multi-Cloud Environments