March 2, 2025

Fortifying the Perimeter: Static Code Analysis and CDR in a Layered Defense Strategy

In the face of increasingly sophisticated cyber threats, a layered security approach is paramount. While Content Disarm and Reconstruction (CDR) offers a robust method for sanitizing document-based threats by reconstructing files to eliminate active content, its efficacy is limited when dealing with executable files. Executables, by their nature, cannot be reconstructed without altering their fundamental operation, …

Fortifying the Perimeter: Static Code Analysis and CDR in a Layered Defense Strategy Read More »

Removable Media Malware Scanning Kiosks: A Comprehensive Approach to NIST Media Protection

Removable media devices represent a significant attack vector for organizations. USB drives, external hard drives, and other removable media can introduce malware, facilitate data exfiltration, or compromise network integrity if not properly secured. The National Institute of Standards and Technology (NIST) Special Publication 800-53 Revision 5 addresses these concerns through various media protection controls, notably …

Removable Media Malware Scanning Kiosks: A Comprehensive Approach to NIST Media Protection Read More »

Scroll to Top
Scroll to Top