Blog

Featured Posts

What Is Zero Trust Architecture?
Sunil Muralidhar
October 1, 2020

What Is Zero Trust Architecture?

Read Post
4 Top Benefits of Application Whitelisting
Jai Balasubramaniyan
September 26, 2020

4 Top Benefits of Application Whitelisting

Read Post
Key Tenets of Zero Trust Architecture
Satyam Tyagi
September 4, 2020

Key Tenets of Zero Trust Architecture

Read Post

Recent Posts

Cybersecurity News Roundup: September, 2020

Cybersecurity Challenges and Strategies for Law Firms

Cybersecurity Month in Review: August 2020 

Application Whitelisting vs. Application Blacklisting: Pros and Cons

3 Key Takeaways from NIST SP 800-167: Guide to Application Whitelisting

Types of Application Whitelisting

Best Practices for Special-Purpose System Security

Cybersecurity for Retailers: Protecting POS Systems from Cyber Threats

Cybersecurity in ANZ: Securing Organisations from Cyber Threats

Micro-Segmentation: A Timely Security Solution

Data Breach Protection in BFSI: Challenges and Solutions

Cyber Risk Quantification: How CISOs and CIOs Can Win the Board Meeting

ColorTokens Team Spotlight: Meet Elvis Jusic

How to Comply with PCI-DSS 4.0

What We Know About PCI-DSS 4.0

History of PCI-DSS: The Path to 4.0

1 2 3 6