| Finally, IoT security gets much-needed attention | EET India | May 29, 2015 |
| Initiative to secure smart cities unveiled | IT Web | May 28, 2015 |
| 'Black Cloud'™ darkens the enterprise to all but authorized devices | Government Computer News | May 20, 2015 |
| Top 9 cloud computing threats | Computerworld Australia | May 19, 2015 |
| How AT&T Is Virtualizing Security | The CIO Report | May 18, 2015 |
| Oracle Issues VENOM Security Updates | SecurityWeek | May 18, 2015 |
| Sony Hack Aftermath: How Hollywood is Getting Tough on Cybersecurity | Variety | May 14, 2015 |
| Channel Partner Program Roundup: Cirrity, Westell, Carousel Industries | The VARGuy | May 14, 2015 |
| THE ROLE OF CLOUD BROKERS IN THE CLOUD | Backup Technology | May 13, 2015 |
| Cloud Security Alliance, Waverley Labs Collaborate On Open-Source Software-Defined Perimeter Spec | Dark Reading | May 13, 2015 |
| What will a Majority Conservative Government mean for the Cyber Security and Tech Industry? | Information Security Buzz | May 12, 2015 |
| Cloud Access Security Broker keeps usage data on-premise as you discover, analyze and secure cloud applications | Network World | May 11, 2015 |
| The new perimeter and the rise of IDaaS | GCN | May 08, 2015 |
| Combating the Notorious Nine with Zero Trust Data Security | Cloud Wedge | May 08, 2015 |
| NIST prepping more cloud security control guidance to complement FedRAMP | FierceGovernmentIT | May 07, 2015 |
| Top 11 Virtualization Risks Identified | Network Computing | May 07, 2015 |
| Cirrity Snags Cisco Master Service Provider Designation as Company Announces Azure Solutions | TMCnet | May 06, 2015 |
| TIC overlay just the beginning for FedRAMP, says Goodrich | FierceGovernmentIT | May 06, 2015 |
| Make the cloud fit like a nice suit | Federal Computer Week | May 05, 2015 |
| Cloud Security Alliance, (ISC)²® Team Up on New Cloud Security Certification | The VAR Guy | May 05, 2015 |