ChaptersCircleEventsBlog
Join us for the in-person CCSK Azure course at Black Hat from August 4–5! Register now for a hands-on deep dive and secure your spot now!

Announcements

Announcements
 What Is Network Security?
What Is Network Security?

ITPro Today

May 5, 2022

Felderman: Congress must do more to bolster cybersecurity
Felderman: Congress must do more to bolster cybersecurity

Telegraph Herald

May 5, 2022

AWS suggests adding a core 'Improve' function to cyber framework as NIST ponders CSF 2.0
AWS suggests adding a core 'Improve' function to cyber framework as NIST ponders CSF 2.0

Inside Cyber Security

May 4, 2022

Information Security for SMEs: Doing the basics need not cost the earth
Information Security for SMEs: Doing the basics need not cost the earth

SME Web

May 4, 2022

5 Ways an Organization Can Manage Its Big Data Security
5 Ways an Organization Can Manage Its Big Data Security

BBN Times

May 4, 2022

Zero trust is more than just vendors and products – it requires process
Zero trust is more than just vendors and products – it requires process

The Register

May 3, 2022

The VC View: The DevSecOps Evolution and Getting "Shift Left" Right
The VC View: The DevSecOps Evolution and Getting "Shift Left" Right

Security Week

May 2, 2022

What Is Zero Trust Network Access (ZTNA)?
What Is Zero Trust Network Access (ZTNA)?

The New Stack

May 2, 2022

Cloud Security Alliance promotes cybersecurity framework additions to address neglected risks
Cloud Security Alliance promotes cybersecurity framework additions to address neglected risks

Inside Cyber Security

April 28, 2022

You Are Responsible for Data Security in the Cloud
You Are Responsible for Data Security in the Cloud

Security Boulevard

April 28, 2022

‘Cloud squatters’ find data meant for previous tenants
‘Cloud squatters’ find data meant for previous tenants

Morning Brew

April 28, 2022

Cloud and Saas Security - The Need for a Comprehensive Approach
Cloud and Saas Security - The Need for a Comprehensive Approach

CIO Review

April 27, 2022

New SDP 2.0 specification facilitates zero-trust maturity
New SDP 2.0 specification facilitates zero-trust maturity

CSO Magazine

April 26, 2022

SaaS misconfigurations lead to cybersecurity incidents
SaaS misconfigurations lead to cybersecurity incidents

Security Magazine

April 19, 2022

Rethinking Cyber-Defense Strategies in the Public-Cloud Age
Rethinking Cyber-Defense Strategies in the Public-Cloud Age

Threatpost

April 19, 2022

Why We Need People-Defined Cybersecurity
Why We Need People-Defined Cybersecurity

Forbes

April 18, 2022

Getting to Zero-Trust Solution Design
Getting to Zero-Trust Solution Design

Security Boulevard

April 15, 2022

Dismal SaaS management ups cybersecurity risk
Dismal SaaS management ups cybersecurity risk

SC Media

April 15, 2022

Overcoming 4 enterprise security challeges
Overcoming 4 enterprise security challeges

Security Magazine

April 14, 2022

The perils of SaaS misconfigurations
The perils of SaaS misconfigurations

Help Net Security

April 14, 2022