CDM Featured Whitepapers

Beyond FTP: Securing and Managing File Transfers


PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors


Four Essential Strategies of Endpoint Security Protection

Absolute Software


Raising Your Threat IQ: The Importance of Democratizing Threat Intelligence

By Travis Farral, director of security strategy at Anomali Threat intelligence continues to become…

Top IoT app ideas and IoT security enhancement with Blockchain

By James Warner The IoT is evolving and 2018 brings something fascinating for developers…

Cyber-attacks thrive the market for Managed Security Services

Growing volumes of data on account of increased IOT Adoption and increased mobile device…

NYT Report: U.S. Cyber units planted destructive Malware in Russian Power Grid

According to The New York Times, the United States planted destructive malware in Russia’s…

Ensure the safety of your customers’ data throughout the holidays

Holiday safety tips for customer data safety By Evan Morris, Network Security Manager at…

Vehicle Vulnerabilities

Insecure communication strikes again By DRP; Cybersecurity Lab Engineer Consumers have spoken and the…

The Ghost in the Machine

Investigating the cost of digital fraud and what publishers can do to combat it….

French authorities released the PyLocky decryptor for versions 1 and 2

Good news for the victims of the pyLocky Ransomware versions 1 and 2, French…

Two Strategies to Get More Value from Your Existing Threat Intelligence Sources

Using normalization and machine learning to get more from your threat data By Wayne…

Resolve Security Issues Involving Bugs with Better QA Strategy

By Munish Garg The main objective of software testing of an application is to…

Show Buttons
Hide Buttons