CDM Featured Whitepapers

The GoAnywhere Book of Secure File Transfer Project Examples


PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors


Four Essential Strategies of Endpoint Security Protection

Absolute Software


South Korea – 1,600 guests at 30 motels secretly live streamed

Four people from South Korea are accused of secretly live streaming, and selling videos…

Thomas Edison: An Inspiration for Cybersecurity Inventions

As an inventor and patent holder on various cybersecurity inventions and having been involved…

EpochTimes Exclusive: Supermicro Backup Server Used by Hillary Clinton Highlights Security Risks of China Supply Chain

BY ANNIE WU, EPOCH TIMES (EXCERPT) March 22, 2019 A little-noticed detail in the…

The Four Most Serious Threats Facing Online Businesses In 2018

by Matt Davis, Future Hosting Online crime will cost businesses $2 trillion in 2019….

Going Beyond HIPAA Compliance: A Case Study

By Josh Paape A Case Study on how Black River Memorial Hospital Improved Security…

Signs That Indicate Your WordPress Site is Hacked

By Julia Sowells Discovering a website hack on time is very important; if you…

Google white hat hacker found new bug class in Windows

James Forshaw, a white hat hacker at Google Project Zero, has discovered a new…

Why Your Cybersecurity Strategy Should Include Managed File Transfer

Protecting Sensitive Files In January of this year, independent news platform Patch reported that…

Cyber Security Statistics for 2019

Cybersecurity is often seen as one of those big problems that only large entities…

Psychological Operations Behind Ransomware Attacks

By Milica D. Djekic The ransomware attacks could cause the sabotage of your entire…

Show Buttons
Hide Buttons