CDM Featured Whitepapers

Beyond FTP: Securing and Managing File Transfers


PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors


Four Essential Strategies of Endpoint Security Protection

Absolute Software


NYT Report: U.S. Cyber units planted destructive Malware in Russian Power Grid

According to The New York Times, the United States planted destructive malware in Russia’s…

Ensure the safety of your customers’ data throughout the holidays

Holiday safety tips for customer data safety By Evan Morris, Network Security Manager at…

Vehicle Vulnerabilities

Insecure communication strikes again By DRP; Cybersecurity Lab Engineer Consumers have spoken and the…

The Ghost in the Machine

Investigating the cost of digital fraud and what publishers can do to combat it….

French authorities released the PyLocky decryptor for versions 1 and 2

Good news for the victims of the pyLocky Ransomware versions 1 and 2, French…

Two Strategies to Get More Value from Your Existing Threat Intelligence Sources

Using normalization and machine learning to get more from your threat data By Wayne…

Resolve Security Issues Involving Bugs with Better QA Strategy

By Munish Garg The main objective of software testing of an application is to…

The Cyber Mafia

Rise of digital gangs and vigilantes By Marcin Kleczynski, CEO and Co-Founder, Malwarebytes If…

Protecting against Cybersecurity’s Weakest Link: The Human Factor

By Joshua Behar There’s no doubt about it — users pose the greatest danger…

Healthcare Data Security

By Milica D. Djekic Anyone using emerging technologies would more or less deal with…

Show Buttons
Hide Buttons