CDM Featured Whitepapers

The GoAnywhere Book of Secure File Transfer Project Examples


PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors


Four Essential Strategies of Endpoint Security Protection

Absolute Software


Mid-Market Businesses, Don’t Think Small about Security

By Jake Kiser, CEO, StrongKey Whether in business or cybersecurity, it doesn’t help small…

Automated STIG “Hardening” Finally Comes to Government IT

For the thousands of hard-working men and women responsible for securing government IT networks…

RSA Conference: $900 discount—last day for sweet deal!

Just like chocolate and flowers, our special Valentine’s Day discount is a limited-time treat….

Bank of Valletta shut down its operations after a cyber attack

Bank of Valletta, the largest bank of Malta was hit by a cyber attack, attackers…

Shattered! Security in a Fragmented World of Workloads

by Satyam Tyagi, Director Product Management, ColorTokens Inc. Look at me, I’m in tatters!…

Phishing in the Dark: Employee Security Gaps Are Growing

By Atif Mushtaq, CEO of SlashNext Phishing is often equated with phishing emails containing…

Overcoming Software Security Issues Caused by the Third-Party Software Procurement Model

By Tae Jin “TJ” Kang, CEO, Insignary, Inc. As software becomes more sophisticated, organizations…

CBS News Exclusive: Hackers are stealing millions of medical records – and selling them on the dark web

As health care providers store patients’ medical records digitally, some have left their files…

Open-Source Code

Quick Review of the “Flat map-stream” attack THE SOCIAL ENGINEERING ATTACK Recently, a malicious…

Want to Secure Your Endpoints? Go Beyond the Endpoint

by Jai Balasubramaniyan, Director of Product Management, ColorTokens Inc. Traditional endpoint security control has…

Show Buttons
Hide Buttons