Call us Toll Free (USA): 1-833-844-9468     International: +1-603-280-4451 M-F 8am to 6pm EST

CDM, the world's top cybersecurity magazine is celebrating 13 years anniversary.

Read, listen, learn, watch, or write for us and be a part of the global cyber security community.

Expert Spotlight: Koushik Anand on IAM and PAM Excellence at Enterprise Scale

By Gary Miliefsky, Publisher With more than 80% of breaches involving stolen or misused credentials, identity is the control point that matters most. Koushik Anand helps enterprises secure digital identities…

Gary MiliefskyGary Miliefsky
September 16, 2025

Download Cyber Defense Magazine September Edition
for 2025

Published monthly by Cyber Defense Magazine, this resource shares a wealth of information to help you stay one step ahead of the next cyber threat.

Bridging the Cybersecurity Talent Gap

There’s no doubt about it. Cybersecurity incidents are rising. In 2024, the FBI reported a 9% increase in ransomware complaints targeting critical U.S. infrastructure sectors, such as healthcare, manufacturing and government facilities….

Robert C. JansenRobert C. Jansen
TekStream

Digital Transformation Failures: A National Security Crisis in the Making

In the hyperconnected world, digital transformation has become synonymous with progress, efficiency and innovation. For governments, business and defense organizations alike, the ability to leverage the power of digital technologies…

Joe CristJoe Crist
Transform 42

Securing Linux Systems in the Age of AI: Unified Security Strategies for Modern Enterprises

Introduction In the rapidly evolving landscape of cybersecurity, the integration of Artificial Intelligence (AI) has emerged as a transformative advancement. This is particularly true in the realm of Linux-based systems,…

Inna UshakovaInna Ushakova
AI EdgeLabs

Preparing for the EU’s DORA amidst Technical Controls Ambiguity

The financial sector is bracing for a significant shift in its digital landscape as the EU’s Digital Operational Resilience Act (DORA) prepares to take effect in January 2025. This new…

Martin GreenfieldMartin Greenfield
Quod Orbis

Beyond the Firewall: Protecting Your Marketing Department from Cyber Threats and Safeguarding Digital Assets

Digital media created more opportunities for companies to engage with consumers than ever before, but such increased interconnectedness has a price. Attacks are becoming progressively advanced, targeting not only a…

Mushegh HakobjanyanMushegh Hakobjanyan
 Andava Digital

Beyond Buzzwords: The Real Impact of AI on Identity Security

Artificial intelligence (AI) has become one of the most discussed technologies in recent years, often touted as the answer to many of today’s pressing challenges. In the cybersecurity space, especially…

Israel DuanisIsrael Duanis
Linx Security
SPOTLIGHT

Innovator Spotlight: WitnessAI

WitnessAI Delivers Security for the AI Era In the AI era, innovation is moving fast. Unfortunately, this means that the risks associated with this movement are too. Malicious activities like…

September 16, 2025
POPULAR

Publisher’s Spotlight: NAKIVO Backup & Replication v11

A Powerful, All-in-One Solution for Cyber-Resilient Backup and Recovery In an era where ransomware, cloud complexity, and regulatory pressures are reshaping data protection priorities, NAKIVO Backup & Replication v11 provides…

Countdown to Digital Armageddon: U.S. and Russia on the Brink

by Gary Miliefsky, Publisher, Cyber Defense Magazine In the shadowy corners of the internet, war is already underway. It doesn’t look like the battles of old – no tanks, no…

From Instinct to Impact: How CYE is Redefining Cybersecurity with Data Science and Business Precision

A Conversation with Ira Winkler on Turning Cyber Risk into Measurable Business Value Through the Power of Hyver In a world where cybersecurity is no longer a back-office concern but…

AI Readiness Starts With Identity: Why Gathid Is Leading the Charge

by Gary  Miliefsky, Publisher As artificial intelligence reshapes the cybersecurity landscape, one truth has become abundantly clear: identity and access governance must evolve in lockstep. Enterprises rushing to integrate AI across…

Innovator Spotlight: LatticaAI

Lattica’s Mission: Making Private AI a Reality with the Power of Fully Homomorphic Encryption In the buzz-heavy world of AI and cybersecurity, it’s not every day a company steps out…

MITRE CVE Program in Jeopardy

As a former advisory board member to the CVE/OVAL initiatives, I’m sounding the alarm: MITRE has confirmed that funding for the CVE and CWE programs will expire on April 16,…

The True Cost of Cybercrime: Why Global Damages Could Reach $1.2 – $1.5 Trillion by End of Year 2025

Introduction: The Escalating Economic Threat of Cybercrime Cybercrime is no longer just an IT problem—it has evolved into a global economic crisis, affecting corporations, governments, and individuals alike. With increasing…

High Speed Smishing: The Psychology Behind Toll Road Scams

Ping! A sudden message appears: “Please pay for Toll Road usage on [insert random day here].” Instantly, you find yourself wondering, Where did I go that day? Did I forget…

TOP 100 IN CYBERSECURITY

Top Global CISOs, Top InfoSec Innovators and Black Unicorn Awards Program for 2025 Now Open...

X

Stay Informed. Stay Secure. Read the Latest Cyber Defense eMag

X