Call us Toll Free (USA): 1-833-844-9468     International: +1-603-280-4451 M-F 8am to 6pm EST

CDM, the world's top cybersecurity magazine is celebrating 13 years anniversary.

Read, listen, learn, watch, or write for us and be a part of the global cyber security community.

A CISO’s Guide to Managing Cyber Risk in Healthcare

Now more than ever before, our healthcare data is under attack. Of all of the sensitive information available on the dark web, medical records are among the most expensive, costing on…

Gaurav BangaGaurav Banga
Balbix
September 13, 2025

Download Cyber Defense Magazine September Edition
for 2025

Published monthly by Cyber Defense Magazine, this resource shares a wealth of information to help you stay one step ahead of the next cyber threat.

Why The Open Web Application Security Project (OWASP) Mobile Application Security (MAS) Project Is Critical

The OWASP MAS project continues to lead the way in mobile application security. This article describes the resources and tools which have recently been added to OWASP MAS, which provides…

George McGregorGeorge McGregor
Approov, Inc.

The Critical Role of Sboms (Software Bill of Materials) In Defending Medtech From Software Supply Chain Threats

Software supply chain attacks have emerged as a serious threat in the rapidly evolving field of cybersecurity, especially in medical devices. As these devices become more and more interconnected and…

Ken ZalevskyKen Zalevsky
Vigilant Ops

Ransomware Tactics Are Shifting. Here’s How to Keep Up

It’s common knowledge in the cybersecurity industry that ransomware is on the rise, with median demands rising 20% year-over-year across virtually all industries. But it’s not only the ransom sums…

Kerri ShaferKerri Shafer
Arctic Wolf

12 Ways to Protect Your Business from Hackers During Remote Work

Remote work is here to stay, with nearly a quarter of the U.S. workforce (22%) expected to be working remotely by 2025. In fact, 42% of office employees have stated they would…

Michelle MooreMichelle Moore
University of San Diego’s

Boost Operational Resilience: Proactive Security with CORA Best Practices

On almost a monthly basis, the US Cybersecurity & Infrastructure Security Agency (CISA) publishes advisories about the latest cybersecurity risks, attacks and vulnerabilities to help organizations defend and protect themselves…

Matt MalarkeyMatt Malarkey
Titania

More Than Sales… How Brokers Can Play a Critical Role in Strengthening the USA’s National Cybersecurity

As cyber threats continue to rise, enterprises can rely on unexpected allies for support: their insurance brokers. Brokers are not only able to secure robust cyber insurance coverage, they are…

Matthieu Chan TsinMatthieu Chan Tsin
Cowbell
SPOTLIGHT

Innovator Spotlight: Oleria

Identity’s New Frontier: How CISOs Can Navigate the Complex Landscape of Modern Access Management The cybersecurity battlefield has shifted. No longer are perimeter defenses and traditional identity management sufficient to…

Pete GreenPete Green
September 9, 2025
POPULAR

Publisher’s Spotlight: NAKIVO Backup & Replication v11

A Powerful, All-in-One Solution for Cyber-Resilient Backup and Recovery In an era where ransomware, cloud complexity, and regulatory pressures are reshaping data protection priorities, NAKIVO Backup & Replication v11 provides…

Countdown to Digital Armageddon: U.S. and Russia on the Brink

by Gary Miliefsky, Publisher, Cyber Defense Magazine In the shadowy corners of the internet, war is already underway. It doesn’t look like the battles of old – no tanks, no…

From Instinct to Impact: How CYE is Redefining Cybersecurity with Data Science and Business Precision

A Conversation with Ira Winkler on Turning Cyber Risk into Measurable Business Value Through the Power of Hyver In a world where cybersecurity is no longer a back-office concern but…

AI Readiness Starts With Identity: Why Gathid Is Leading the Charge

by Gary  Miliefsky, Publisher As artificial intelligence reshapes the cybersecurity landscape, one truth has become abundantly clear: identity and access governance must evolve in lockstep. Enterprises rushing to integrate AI across…

Innovator Spotlight: LatticaAI

Lattica’s Mission: Making Private AI a Reality with the Power of Fully Homomorphic Encryption In the buzz-heavy world of AI and cybersecurity, it’s not every day a company steps out…

MITRE CVE Program in Jeopardy

As a former advisory board member to the CVE/OVAL initiatives, I’m sounding the alarm: MITRE has confirmed that funding for the CVE and CWE programs will expire on April 16,…

The True Cost of Cybercrime: Why Global Damages Could Reach $1.2 – $1.5 Trillion by End of Year 2025

Introduction: The Escalating Economic Threat of Cybercrime Cybercrime is no longer just an IT problem—it has evolved into a global economic crisis, affecting corporations, governments, and individuals alike. With increasing…

High Speed Smishing: The Psychology Behind Toll Road Scams

Ping! A sudden message appears: “Please pay for Toll Road usage on [insert random day here].” Instantly, you find yourself wondering, Where did I go that day? Did I forget…

TOP 100 IN CYBERSECURITY

Top Global CISOs, Top InfoSec Innovators and Black Unicorn Awards Program for 2025 Now Open...

X

Stay Informed. Stay Secure. Read the Latest Cyber Defense eMag

X