ColorTokens Blogs

Learn everything you need to know about modern cybersecurity, from Application Whitelisting to Zero Trust Architecture.

Featured Posts

3 Things We Learned From 1,283 InfoSec Leaders’ Zero Trust Security Plans

White House Calls for Private Companies to Adopt Zero Trust Security

What Is Zero Trust Architecture?

Recent Posts

Why Online Retailers Should Prepare for Cyberattacks: 2020 Holiday Shopping Season Edition

What Is Ryuk Ransomware? And Why It’s Healthcare’s Biggest Disruptor Since COVID-19

The 4 Trust Dimensions in Zero Trust Security

Cybersecurity News Roundup: September, 2020

4 Top Benefits of Application Whitelisting

Cybersecurity Challenges and Strategies for Law Firms

Cybersecurity Month in Review: August 2020 

Application Whitelisting vs. Application Blacklisting: Pros and Cons

3 Key Takeaways from NIST SP 800-167: Guide to Application Whitelisting

7 Key Tenets of Zero Trust Architecture

6 Types of Application Whitelisting

Best Practices for Special-Purpose System Security

Cybersecurity for Retailers: Protecting POS Systems from Cyber Threats

Cybersecurity in ANZ: Securing Organisations from Cyber Threats

Micro-Segmentation: A Timely Security Solution

Data Breach Protection in BFSI: Challenges and Solutions

1 2 3 4 7

Become a Partner

form loader

By submitting this form, you agree to ColorTokens
Terms of Service and Privacy Policy

Thank you for your interest in the ColorTokens Partner Program!

Our team will be in touch soon with more information.