CDM Featured Whitepapers

Beyond FTP: Securing and Managing File Transfers

HelpSystems

PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

SureID

Four Essential Strategies of Endpoint Security Protection

Absolute Software


News

How We Can Secure The Energy Grid and the Smart Home Of The Future

by Uri Kreisman, COO, Bluechip Systems On August 15th, 2012, the Saudi Arabian group…

IMPORTANCE OF “The General Data Protection Regulation” in Cyber Security World

A milestone in personal data protection by Yagiz Atmaça, CTO and Co-Founder, Zemana How…

Pentester Syndrome

Making things appear worse than they are by Alex Haynes, Information Security Manager, CDL…

Security Remains Top Concern for IBM AIX Community

SURVEY OF AIX IT PROFESSIONALS ADDRESSES CHALLENGES AND SECURITY SOLUTIONS THEY PLAN TO IMPLEMENT…

Safer Internet Day 2018: Where You’re Falling Short on Your Online Ad Campaigns

by Roy Dovaston, Operations Lead, Click Guardian On 6th February 2018 ‘Safer Internet Day’…

Cyber-attacks thrive the market for Managed Security Services

GROWING VOLUMES OF DATA ON ACCOUNT OF INCREASED IOT ADOPTION AND INCREASED MOBILE DEVICE…

BREAKING NEWS: WikiLeaks Founder Julian Assange Charged in 18-Count Superseding Indictment

Charges Related to Illegally Obtaining, Receiving and Disclosing Classified Information A federal grand jury…

G Suite users’ passwords stored in plain-text for more than 14 years

Google accidentally stored the passwords of its G Suite users in plain-text for 14…

Are your emails safe?

Understanding the different types of email security solutions by Scott Raspa, VP, Sales &…

4 Areas with a Growing Cyber Risk of Digital Extortion

By Derrick Rice, Principal Consultant, Asylas In a world where it’s becoming the norm…

Show Buttons
Hide Buttons