CDM Featured Whitepapers

Cybersecurity Insiders: 2018 Cloud Security Report

HelpSystems

PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

SureID

Four Essential Strategies of Endpoint Security Protection

Absolute Software


News

Experts detailed how China Telecom used BGP hijacking to redirect traffic worldwide

Security researchers revealed in a recent paper that over the past years, China Telecom used…

U.S. Air Force announced Hack the Air Force 3.0, the third Bug Bounty Program

The United States Air Force announced earlier this week that it has launched the…

Flaws in several self-encrypting SSDs allows attackers to decrypt data they contain

The encryption system implemented by popular solid-state drives (SSDs) is affected by critical vulnerabilities…

Video Data Security. The view from the experts.

Today, more and more video security cameras are increasingly connected to the internet and…

Cutting Through the Fog of More

An overheard conversation between a software vendor and a security professional sheds light on…

Flaw in Icecast streaming media server allows to take off online Radio Stations

Icecast streaming media server is affected by a flaw that could be exploited by…

USB drives are primary vector for destructive threats to industrial facilities

USB removable storage devices are the main vector for malware attacks against industrial facilities, states Honeywell…

Cyber attack exposes sensitive data about a nuclear power plant in France

A cyber attack on a French firm Ingerop allowed attackers to access confidential documents…

Iran hit by a more aggressive and sophisticated Stuxnet version

Iran’s strategic network was hit by a new destructive and sophisticated version of the…

New Data Affirms Cyber Threat for Industrial Control Systems

Recent CyberX report finds that plain-text passwords, direct internet connections and weak anti-virus protections…

Show Buttons
Hide Buttons