CDM Featured Whitepapers

Beyond FTP: Securing and Managing File Transfers

HelpSystems

PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

SureID

Four Essential Strategies of Endpoint Security Protection

Absolute Software


News

Phoebe the Phisher: Will this Cyber-villain Ever be Captured?

While researching for this article about Gary Berman’s wildly popular comic series, The CyberHero…

Security Product Spotlight: Aegis Fortress L3

I was invited by Apricorn to test their Aegis Fortress L3 – USB 3.1…

Digital Transformation Speaker Series Coming to New Hampshire

Will you be in the New Hampshire area on May 2, 2019? You’re Invited…

Third Party – Minimizing Organizational Exposure by Mitigating the Wild Card in Security Strategies

2019 Shared Assessments Third Party Risk Management Toolkit Helps Organizations Replace FUD with Actionable…

Russian Twitter bot activity increased in the wake Mueller report release

Experts at security firm SafeGuard reported that Russian Twitter bot activity raised up by…

Defense by offense

Purple Team: The Meeting Point of Red and Blue Teams Meet by Maya Schirmann,…

Aligning Cyber security Effectiveness with Core Business Objectives

Cybersecurity programs establish defined goals but lack measurable indicators to gauge effectiveness. by Brian…

Marcus Hutchins pleads guilty to two counts of banking malware creation

British malware researcher Marcus Hutchins has pleaded guilty to developing and sharing the banking…

Quis custodiet ipsos custodes?

Who watches the watchers? By Dr. Richard Ford, Chief Scientist, Forcepoint Over the last…

What to look for when selecting an MSSP

by Brad Taylor, CEO, Proficio Medium to large-sized organizations increasingly relies on managed security…

Show Buttons
Hide Buttons