CDM Featured Whitepapers

Cybersecurity Insiders: 2018 Cloud Security Report


PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors


Four Essential Strategies of Endpoint Security Protection

Absolute Software


Experts unveil a “to-do” list of pressing cybersecurity challenges for 2019 and further

Key players, including public bodies, need to take a proactive approach and lead the…

Zurich refuses to pay Mondelez for NotPetya damages because it’s ‘an act of war’

Zurich American Insurance Company is refusing to refund its client because consider the attack…

A Guide to Cybersecurity Conversations For the C-Suite In 2019

In 2019, drive more business value from your cybersecurity investments. It’s easy to get…

Z-WASP attack: hackers used Zero-Width spaces to bypass Office 365 protections

Z-WASP attack: Phishers are using a recently fixed flaw in Office 365 that allows them to…

Security Product Spotlight: datashur Pro – encrypted USB device

I was invited by iStorage ( to test their datashur PRO USB storage device….

Ironic turn … Kaspersky Labs helped NSA to catch alleged data thief

Kaspersky was a long accused to support Russian intelligence, in an ironic turn, source…

Youngster behind massive data leak of German politicians data

A 20-year-old hacker was arrested for the recent massive data leak that impacted hundreds…

Overcoming the Cybersecurity Staffing Drought

Companies won’t ever be able to hire enough qualified pros. Partnering with full-service cybersecurity…

JW’s Signature Cybersecurity Conference comes to The George Washington University

On January 31, 2019 on The George Washington University campus at the Jack Morton…

ReiKey app for macOS can detect Mac Keyloggers using event taps

ReiKey is a free tool that allows to scan and detect keylogger that install…

Show Buttons
Hide Buttons