ColorTokens Blogs

Learn everything you need to know about modern cybersecurity, from Application Whitelisting to Zero Trust Architecture.

Featured Posts

What Is Ryuk Ransomware? And Why It’s Healthcare’s Biggest Disruptor Since COVID-19

What Is Zero Trust Architecture?

7 Top Benefits of Micro-Segmentation

Recent Posts

Application Whitelisting vs. Application Blacklisting: Pros and Cons

3 Key Takeaways from NIST SP 800-167: Guide to Application Whitelisting

7 Key Tenets of Zero Trust Architecture

6 Types of Application Whitelisting

Best Practices for Special-Purpose System Security

Cybersecurity for Retailers: Protecting POS Systems from Cyber Threats

Cybersecurity in ANZ: Securing Organisations from Cyber Threats

Micro-Segmentation: A Timely Security Solution

Data Breach Protection in BFSI: Challenges and Solutions

Cyber Risk Quantification: How CISOs and CIOs Can Win the Board Meeting

ColorTokens Team Spotlight: Meet Elvis Jusic

How to Comply with PCI-DSS 4.0

What We Know About PCI-DSS 4.0

History of PCI-DSS: The Path to 4.0

3 Micro-Segmentation Approaches and Their Pros and Cons

Micro-Segmentation: The Answer to the Vanishing Perimeter

1 2 3 4 6

Become a Partner

By submitting this form, you agree to ColorTokens
Terms of Service and Privacy Policy

Thank you for your interest in the ColorTokens Partner Program!

Our team will be in touch soon with more information.