Author: Chris Goettl / Source: Information Security Buzz
Author: David Freddoso / Source: Washington Examiner
Author: Asha McLean / Source: ZDNet