CDM Featured Whitepapers

Beyond FTP: Securing and Managing File Transfers

HelpSystems

PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

SureID

Four Essential Strategies of Endpoint Security Protection

Absolute Software


News

Marcus Hutchins pleads guilty to two counts of banking malware creation

British malware researcher Marcus Hutchins has pleaded guilty to developing and sharing the banking…

Quis custodiet ipsos custodes?

Who watches the watchers? By Dr. Richard Ford, Chief Scientist, Forcepoint Over the last…

What to look for when selecting an MSSP

by Brad Taylor, CEO, Proficio Medium to large-sized organizations increasingly relies on managed security…

High-Level Strategies for Third-Party Risk Mitigation

By Phil Won, Product Manager, Owl Cyber Defense High-Level Strategies for Third-Party Risk Mitigation…

Attacked on All Sides

Why Enterprise Businesses Must Evolve from Controls-Based Approach to a Cybersecurity Ecosystem. by Otavio…

Front-line defense against cyber-war

Educate End Users By Mison Riggins, Cybersecurity SME / Tech Writer, Inspired eLearning We…

Here’s How SMBs Can Affordably Protect Themselves

aiMSSP Enables Managed Security Service Providers to Deliver Comprehensive, Affordable, Integrated Security Services to…

How Certificate Expiration Led to Some of the Largest IT System Failures of the Last Two Years

By Tim Callan, Senior Fellow, Sectigo Our modern IT landscape depends fundamentally on digital…

What do Organizations Need to Build a Security Minded Culture?

by Larry Cates, President, and CEO, Global Learning Systems As many organizations struggle with…

Unlocking Your Users’ Digital Identities with a Selfie

by Dean Nicolls, VP of Marketing, Jumio In the world of digital identity verification,…

Show Buttons
Hide Buttons