CDM Featured Whitepapers

Cybersecurity Insiders: 2018 Cloud Security Report

HelpSystems

PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

SureID

Four Essential Strategies of Endpoint Security Protection

Absolute Software


News

November Patch Tuesday Update

This Month’s Breakdown on Latest Updates from Microsoft and Adobe by Chris Goettl, director…

Immersive training on Regent University’s cyber range puts cyber professionals ahead of the game

Cyberattacks affect the lives of everyone, from business owners required to safeguard assests and…

CVE-2018-15961: Adobe ColdFusion Flaw exploited in attacks in the wild

Experts at Volexity discovered that a recently patched remote code execution flaw (CVE-2018-15961) affecting the Adobe ColdFusion…

Reading the Android Ecosystem Security Transparency Report

According to Android Ecosystem Security Transparency Report the number of potentially harmful applications has…

Experts detailed how China Telecom used BGP hijacking to redirect traffic worldwide

Security researchers revealed in a recent paper that over the past years, China Telecom used…

U.S. Air Force announced Hack the Air Force 3.0, the third Bug Bounty Program

The United States Air Force announced earlier this week that it has launched the…

Flaws in several self-encrypting SSDs allows attackers to decrypt data they contain

The encryption system implemented by popular solid-state drives (SSDs) is affected by critical vulnerabilities…

Video Data Security. The view from the experts.

Today, more and more video security cameras are increasingly connected to the internet and…

Cutting Through the Fog of More

An overheard conversation between a software vendor and a security professional sheds light on…

Flaw in Icecast streaming media server allows to take off online Radio Stations

Icecast streaming media server is affected by a flaw that could be exploited by…

Show Buttons
Hide Buttons