CDM Featured Whitepapers

Beyond FTP: Securing and Managing File Transfers


PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors


Four Essential Strategies of Endpoint Security Protection

Absolute Software


Yes, one USB drive can cause HAVOC

By Ruben Lugo of Kingston Technology The wizardry one USB drive can cause and…

A New Class of Cyber Threat: Digital Threats Are Targeting Your Digital Innovation Programs

By Lou Manousos, CEO, RiskIQ Everyone uses the internet, both the good guys and…

Standby Virtual Desktops: The IT Insurance Policy For Mayhem

By Michael Abboud Allstate’s “mayhem” commercials underscore the need to protect yourself and your…

Browser-based Cryptocurrency Miners

By Shawn Pope Towards the end of 2017, browser-based cryptocurrency mining activity increased significantly….

Facial Recognition

Iphones are not the only one with issues By DRP; Cybersecurity Lab Engineer The…

Building a Security Operations Center to Reinforce Trust

By Tom Gilheany, portfolio manager for security training and certifications, Cisco Services To succeed…

The Importance of Insider Threat Mitigation Training

Intellectual Property & Trade Secrets – Gone In 60 Seconds What your company spent…

If You Want to Prevent Breaches, Don’t Make These Three Security Mistakes

By Destiny Bertucci, SolarWinds Head Geek™ There’s one thing that the most high-profile security…

“Feds Bet on A.I. to Fix Uncle Sam’s Cyber Woes”

We have all heard the saying, “don’t bet on the horses,” but What about…

Demystifying the Source Code vs. Binary Debate

By Taylor Armerding, security consultant, Synopsys Is exposure to software source code disastrous enough…

Show Buttons
Hide Buttons