1. Perimeter security;McCoy,2007
2. Simplify zero trust implementation using a five-step methodology,2021
3. Insider threat: The biggest contributor to cyber attacks;Dutta,2021
4. Twitter hack: The spotlight that insider threats need;Ben,2021
5. Managed cloud services: The benefits of outsourcing cloud management;Hein,2021