ColorTokens Blogs

Learn everything you need to know about modern cybersecurity, from Application Whitelisting to Zero Trust Architecture.

Featured Posts

What Is Ryuk Ransomware? And Why It’s Healthcare’s Biggest Disruptor Since COVID-19

What Is Zero Trust Architecture?

7 Top Benefits of Micro-Segmentation

Recent Posts

The Cybersecurity Landscape for Airports: Threats and Mitigation

How Brick-and-Mortar Retailers Can Avoid Cyberattacks During the Holidays

Top 10 Reasons Zero Trust Is the Right Solution for Enterprise Cybersecurity, Right Now

How to Choose an Application Whitelisting Solution 

Zero Trust Architecture: Understanding the NIST Framework of Zero Trust

Why Online Retailers Should Prepare for Cyberattacks: 2020 Holiday Shopping Season Edition

The 4 Trust Dimensions in Zero Trust Security

Cybersecurity News Roundup: September, 2020

4 Top Benefits of Application Whitelisting

Cybersecurity Challenges and Strategies for Law Firms

Cybersecurity Month in Review: August 2020 

Application Whitelisting vs. Application Blacklisting: Pros and Cons

3 Key Takeaways from NIST SP 800-167: Guide to Application Whitelisting

7 Key Tenets of Zero Trust Architecture

6 Types of Application Whitelisting

Best Practices for Special-Purpose System Security

1 2 3 6

Become a Partner

By submitting this form, you agree to ColorTokens
Terms of Service and Privacy Policy

Thank you for your interest in the ColorTokens Partner Program!

Our team will be in touch soon with more information.