Author: Cindy Ng / Source: Varonis Blog
Author: Bhadra Sinha / Source: http://www.hindustantimes.com/
Author: Security Experts / Source: Information Security Buzz