CDM Featured Whitepapers

Cybersecurity Insiders: 2018 Cloud Security Report


PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors


Four Essential Strategies of Endpoint Security Protection

Absolute Software


Four Methods for Encrypting Sensitive Data in a Cloud Environment

The scale of organizations moving their business processes to a hybrid or cloud environment…

The Inevitability of Cyber Crime

Think of all the ways you could be a victim of a crime. Do…

The CNIL’s restricted committee imposes a financial penalty of 50 Million euros against GOOGLE LLC

On 21 January 2019, the CNIL’s restricted committee imposed a financial penalty of 50…

A flaw in vCard processing could allow hackers to compromise a Win PC

A security expert discovered a zero-day flaw in the processing of VCard files that…

Experts unveil a “to-do” list of pressing cybersecurity challenges for 2019 and further

Key players, including public bodies, need to take a proactive approach and lead the…

Zurich refuses to pay Mondelez for NotPetya damages because it’s ‘an act of war’

Zurich American Insurance Company is refusing to refund its client because consider the attack…

A Guide to Cybersecurity Conversations For the C-Suite In 2019

In 2019, drive more business value from your cybersecurity investments. It’s easy to get…

Z-WASP attack: hackers used Zero-Width spaces to bypass Office 365 protections

Z-WASP attack: Phishers are using a recently fixed flaw in Office 365 that allows them to…

Security Product Spotlight: datashur Pro – encrypted USB device

I was invited by iStorage ( to test their datashur PRO USB storage device….

Ironic turn … Kaspersky Labs helped NSA to catch alleged data thief

Kaspersky was a long accused to support Russian intelligence, in an ironic turn, source…

Show Buttons
Hide Buttons