| PUBLICATION | DATE | ARTICLE |
| December 2021 | | |
| MarketScreener | 20 | Mimecast : State CIOs Rank Security as No. 1 Priority for 9th Year |
| BioMetric Update | 16 | Ping launches authorization, BIO-key updates panel for enterprise IAM |
| VentureBeat | 16 | Ory lands $22.5M for zero trust security powered by open source |
| GlobeNewswire | 15 | BIO-key Launches Enhanced Admin Panel and User Experience for IT Teams Managing its PortalGuard Identity-as-a-Service (IDaaS) Solution |
| GlobeNewswire | 13 | Osterman Research Surveys Show IT & Security Decision-Makers Plan Investments in Multi-Factor Authentication & Zero Trust Solutions to Counter Rising Cyberthreats |
| Forbes | 13 | Achieving Cyber Workforce Optimization In 2022 |
| Solutions Review | 6 | 32 Experts Share Predictions for Information Security in 2022 |
| SCMedia | 6 | The data exfiltration deluge: we’ve lost the battle, but can win the war |
| Security Boulevard | 2 | Ransomware pivot 2021: attackers now grab, threaten to leak sensitive data |
| November 2021 | | |
| VentureBeat | 26 | Report: Zero-trust architecture is expected to increase cybersecurity efficacy by 144% |
| Data Center Knowledge | 23 | Trust no one: New technology platforms expand the attack surface |
| Security Boulevard | 22 | Shadow Code is a Major Risk for Web Applications |
| Cision | 17 | Research: Zero Trust is Expected to Double the Efficacy of Cybersecurity Protections |
| SearchSecurity | 15 | 6 reasons unpatched software persists in the enterprise |
| RMail | 11 | RMail Humanizes E-Security in RPost’s Year-End Update |
| Security Boulevard | 9 | Why you need to rethink your data security strategy and go beyond DLP |
| Market Screener | 4 | Government Cybersecurity: Forces Align to Fix K-12 Schools’ Cybersecurity Problem |
| Reseller News | 2 | Enterprises with subsidiaries more prone to cyber attacks, study says |
| CSO | 1 | Enterprises with subsidiaries more prone to cyberattacks, study says |
| October 2021 | | |
| Security Boulevard | 25 | Introducing Anti Data Exfiltration (ADX) |
| BlackFog | 25 | Anti Data Exfiltration (ADX) remains a top priority for 94% of organizations |
| KMWorld | 21 | Managing your most human data source: Microsoft Teams |
| JaxEnter | 13 | How To Prepare Your Business For Data Security Risks In The Next Decade? |
| HelpNet Security | 13 | Is the government’s response to cybersecurity threats enough for your organization? |
| PR Newswire | 12 | Unbound Core Virtualizes Enterprise Cryptographic Orchestration |
| Dice | 11 | How Third-Party Code Makes App Development A Cybersecurity Risk |
| MarketScreener | 6 | Cybersecurity Awareness Training Results in Greater Employee Engagement |
| Search Security | 1 | 6 reasons unpatched software persists in the enterprise |
| September 2021 | | |
| The Enterprisers Project | 29 | Why DevSecOps fails: 4 signs of trouble |
| Health IT Security | 27 | 4 Ways Organizations Can Prevent Healthcare Phishing Attacks |
| Formtek | 27 | Security: Reshuffling of Workers during “Great Resignation” Exacerbates Data Leaks |
| SCMedia | 23 | The parent company trap: Subsidiaries hide sources of cyber risk |
| MSSP Alert | 23 | Enterprises with Multiple Subsidiaries Face Greater Risk of Cyber Attacks |
| Yahoo! Finance | 23 | New CyCognito Report Reveals Subsidiaries are Global Enterprise Achilles Heel; Increasing Attack Surface and Exposure Drawing in Attackers |
| BollyInside | 22 | PerimeterX Third Annual Analysis Report Reveals False Sense of Security |
| Security Magazine | 22 | Shadow Code remains a high security risk |
| BusinessWire | 21 | False Sense of Security — Third Annual PerimeterX Report Reveals that Shadow Code Remains a High Risk |
| PRWeb | 21 | ActiveNav Launches Data Mapping as a Service to Help Privacy and Compliance Teams Shine a Light on Sensitive Data Hotspots |
| Security Boulevard | 20 | A Look Inside the Shadow Code Risk |
| BusinessWire | 16 | GrammaTech Selected SINET16 Award Winner |
| Market Screener | 15 | Mimecast : Ransomware Drives Demand for Managed Security Services |
| Security Intelligence | 10 | How Companies Can Prepare for Botnet Attacks on APIs |
| August 2021 | | |
| Aerospace Manufacturing and Design | 30 | Open-source software vulnerabilities |
| Beta News | 20 | Ensuring compliance takes a front seat when using collaboration tools |
| Gulf News | 17 | It is time businesses looked closely at emails as their weakest link |
| Security Intelligence | 16 | 5 Ways to Defend Against Supply Chain Cyberattacks |
| MeriTalk | 9 | Study Finds Vulnerabilities in COTS Open-Source Components |
| Nextgov | 5 | Report Draws Attention to Vulnerabilities in Commercial-Off-the-Shelf Products |
| TechNewsWorld | 4 | Study Finds 100% of Commercial Apps Contain Security Flaws |
| LinuxInsider | 4 | Study Finds 100% of Commercial Apps Contain Security Flaws |
| BusinessWire | 4 | Osterman Research Software Supply Chain Study Finds 100 Percent of Commercial Applications Contain Vulnerable Software Components |
| Security Boulevard | 3 | Website Risk Analyzer Finds Threats in Your Third Party Code |
| July 2021 | | |
| JD Supra | 29 | Does Teams Work Make the Dreams Work? Or Does it Create Information Governance and Compliance Nightmares? |
| Security Boulevard | 29 | Elevating Web App Security to a National Priority |
| HelpNet Security | 19 | Half of organizations are ineffective at countering phishing and ransomware threats |
| Marketing Dive | 15 | Google begins supporting email authentication protocol to guard against phishing |
| IDM | 15 | Compliance for Microsoft Teams – Reclaim the Driver’s Seat |
| Taiwan News | 13 | 84% of Organizations Experienced Phishing & Ransomware Type Threats in the Past 12 Months |
| ITPro | 13 | 84% of Organizations Experienced Phishing or Ransomware Attacks in the Last Year |
| ITProToday | 8 | Building an Effective Cybersecurity Culture |
| June 2021 | | |
| The Register | 25 | ‘What are the odds someone will find and exploit this?’ Nice one — you just released an insecure app |
| GlobeNewswire | 23 | PerimeterX Code Defender Named Best Security Solution by the 2021 SIIA CODiE Awards |
| HelpNet Security | 3 | It’s time to stop ransomware in its tracks |
| May 2021 | | |
| CSO Online | 25 | Tailor security training to developers to tackle software supply chain risks |
| IDM | 21 | Study Identifies Microsoft Teams Data as Compliance Concern |
| GlobeNewswire | 20 | Study Identifies Microsoft Teams Data as a Source of Compliance Concern Among IT Leaders |
| E&T | 20 | Was Your Disaster Recovery Plan Ready for a Pandemic? |
| HelpNet Security | 19 | Endpoint security: How to shore up practices for a safer remote enterprise |
| The Daily Swig | 14 | Shift Right: Developers Knowingly Release Insecure Applications, Says Report |
| Security Boulevard | 14 | What the Colonial Pipeline Attack Reminds Us About Phishing and Ransomware |
| Security Boulevard | 13 | 81% of Developers at Large Organizations Admit to Knowingly Releasing Vulnerable Applications |
| SC Magazine | 13 | Developers knowingly push flawed code, doubt build environments are secure |
| April 2021 | | |
| Virtualization Review | 16 | Misconfigurations Continue to Plague Cloud Security, New Reports Say |
| Digital Journal | 15 | Why Security Awareness Training is a Top Cybersecurity Investment for Business |
| Security Boulevard | 13 | Osterman Research: Almost One-Third of US Companies Under-Resourcing Cloud Security Despite Escalating Risks |
| SC Media | 1 | Offboarding Tips Will Prevent Employee Data Theft When People Leave the Company |
| March 2021 | | |
| Security Boulevard | 30 | You Want to Know How to Stop Phishing for Good. Hint: It’s Not a Silver Bullet |
| Harvard Business Review | 9 | Cyberattacks Are Inevitable. Is Your Company Prepared? |
| February 2021 | | |
| Business 2 Community | 17 | What You Need to Know About Remote Employee Monitoring Software |
| HelpNet Security | 13 | Employees Aware of Privacy Risks, But Unsure of How They Affect the Workplace |
| | |
| January 2021 | | |
| Security Boulevard | 28 | App Security Takes a Back Seat in the Drive to Digital Transformation |
| Professional Security Magazine Online | 25 | Web Application Security Report |
| Business 2 Community | 22 | Employee Offboarding: How to Keep Data Safe During a Termination |
| HelpNet Security | 22 | Organizations Struggle to Maintain Application Security Across Platforms |
| PR Wire | 21 | Radware research shows API abuse is a leading threat – and enterprises are unprepared for bot traffic |
| ContinuityCentral.com | 21 | Will APIs be the gateway to effective cyber attacks in 2021? |
| ITProPortal | 21 | Most Security Staff Have Little Say In App Security |
| SC Media | 20 | Reliance on cloud, APIs create confusion and introduce risk into software development |
| Security Magazine | 20 | API Abuse is a Leading Cyber Threat |
| Security Boulevard | 12 | Digital Transformation and the Shadow Code Risk |