| Custom Enterprise Apps Posing Shadow Cloud Threats: CSA | CXO Today | February 16, 2017 |
| Migration to Infrastructure-as-a-Service Is Putting Businesses at Risk | IT Biz Advisor | February 15, 2017 |
| Shadow IT Clouds Security | Security Intelligence | February 15, 2017 |
| Companies struggle to deploy security for custom applications | Help Net Security | February 15, 2017 |
| Security in the Cloud | FCW | February 15, 2017 |
| CSA Announces Global Consultancy Program | ReadItQuik | February 15, 2017 |
| Helping Municipalities Establish a Safe, Secure Drone Program | Government Technology | February 14, 2017 |
| How can we secure our smart cities? | Enterprise Innovation | February 14, 2017 |
| Former NSA Chief Optimistic About Cloud Security | eWEEK | February 14, 2017 |
| National Security, Regulation, Identity Top Themes At Cloud Security Summit | Dark Reading | February 14, 2017 |
| CSA: Custom applications creating new 'shadow cloud' risks | SearchSecurity.com | February 13, 2017 |
| IaaS Creating New Variant of Shadow IT | SecurityWeek | February 13, 2017 |
| Cloud Security Alliance Announces General Availability of STARWatch Cloud Security Management Application | Yahoo Finance | February 13, 2017 |
| Cloud Security Alliance Establishes New Third-Party Consultancy Program to Ensure Best Practices in Secure Cloud Implementation | Yahoo Finance | February 13, 2017 |
| RSA 2017: Security is No Joke | eSecurityPlanet | February 13, 2017 |
| #RSAC: Custom Apps, IaaS, Public Cloud Pose Shadow IT Threat | Info Security | February 12, 2017 |
| RSA Conference preview: The agenda can't keep up | InfoWorld Tech Watch | February 12, 2017 |
| RSA 2017: Will It Impact The Enterprise? | Enterprise Mobility Exchange | February 09, 2017 |
| Skyhigh Networks offers cloud security for custom apps | DatacenterDynamics Blog | February 07, 2017 |
| New report outlines drone usage best practices | ITP.net | February 04, 2017 |