CDM Featured Whitepapers

Defending Against Data Breach

Linoma

PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

SureID

A Culture of Cybersecurity: The Only Way Forward

Logical Operations


News

Bug bounty programs and a vulnerability disclosure policy Hackers allowed Pentagon fix thousands of flaws

Bug bounty programs allowed the US agency to receive 2,837 valid bug reports from…

DHS – Tests demonstrate Boeing 757 airplanes vulnerable to hacking

Researchers and private industry experts, along with DHS officials, remotely hacked a Boeing 757…

A regular GitHub user accidentally triggered a flaw Ethereum Parity Wallet that locked up $280 million in Ether

A GitHub user accidentally triggered a flaw in the Parity Wallet library contract of…

Vietnamese APT32 group is one of the most advanced APTs in the threat landscape

According to the incident response firm Volexity, Vietnamese APT32 group is today one of the…

Training to Tackle Insider Threats

Training to Tackle Insider Threats By Pete Burke, technical consultant at Force 3 Much…

Malware signed with stolen Digital code-signing certificates continues to bypass security software

A group of researchers demonstrated that malware signed with stolen Digital code-signing certificates continues…

Measuring Success in Cyber Security

Is no news good news when it comes to cyber security in your business?…

InfoSec Awards 2018 Submission

Cyber Defense Magazine 2018 InfoSec Awards are now open for entry. Early Bird Registration ends…

Hacker threatens Canadian University to dump student info unless the university pay a ransom

A hacker is attempting to extort the Canadian University of Fraser Valley (UFV), threatening…

Halting Hackers for the Holidays

October was National Cyber Security Awareness month and during that time with nearly 2…

Show Buttons
Hide Buttons