CDM Featured Whitepapers

The GoAnywhere Book of Secure File Transfer Project Examples

HelpSystems

PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

SureID

Four Essential Strategies of Endpoint Security Protection

Absolute Software


News

Best Practices to Minimize Negative Impact,Downtime After a Ransomware Infection

by Jim Varner, President, and CEO, SecurityFirst Ransomware has become a scourge to businesses…

Where do I “Sign”?

A short Review on Digital Signatures by Joe Guerra, Cybersecurity Instructor, Hallmark University The…

EU adopts EU Law Enforcement Emergency Response Protocol for massive cyberattacks

Europol announced the EU Law Enforcement Emergency Response Protocol new protocol for law enforcement…

Wilbur WannaCry: Captured Cyber-villain or Has He Broken Free?

I was talking with my friend Gary Berman, aka “Cyber Hero”, you know –…

Role based access control and best implementation practices

by Bhavdip Rathod, IAM Solution Architect, Sailpoint Technologies, Inc A role is a collection…

Service account management (SAM) challenges and best practices

by Bhavdip Rathod, IAM Solution Architect, Sailpoint Technologies, Inc Introduction This article focuses more…

How do we get privacy?

Revisiting the Basics and Importance of Cryptography by Joe Guerra, Cybersecurity Instructor, Hallmark University…

Experts uncovered a malspam campaign using Boeing 737 Max crash

Experts at the 360 Threat Intelligence Center uncovered a new malspam campaign that leverages…

Cyber security as a mandatory rule in this Era

A cyber vision to cyber success. by Pedro Tavares, Founder at CSIRT.UBI & seguranca-informatica.pt…

What recent industry data leaks tell us about CYBER-SECURITY

by Mark Wah, Principal Product Manager at Citrix  The cat and mouse game of…

Show Buttons
Hide Buttons