Author Description

Gary M

Author Posts

This advanced cybersecurity degree shows why strategy is your best security measure.

The biggest cyber threat to an organization is the one that hasn’t been launched yet — the…

RSA Conference 2018 – An Incredible Show Wrapping Up

It was great to meet so many of our readers at #RSAC this year.  We gave out…

RSAC 2018 – Incredible Show – Innovative Winners!

Cyber Defense Magazine (CDM), the industry’s leading electronic information security magazine has spent the past six months…

aiSIEM: The Smart SIEM with Actionable Intelligence

Does your business need to mitigate the security breach risk by minimizing the Mean Time-to- Identify (MTTI)…

Global Threat Intelligence Vendor Landscape for 2018

Cyber Defense Magazine is pleased to provide this Global Threat Intelligence Vendor Landscape for 2018.   PDF  or  FLIPBOOK…

Meet a Cybersecurity Leader at the Intersection of Military and Civilian Intelligence

It’s one thing to complete a rigorous advanced degree in cybersecurity— it’s another to finish two at…

Android Alert: HiddenMiner Android Cryptocurrency miner can brick your device

Researchers at Trend Micro recently discovered a new strain of Android miner dubbed ANDROIDOS HIDDENMINER that can…

We’re Releasing The Global Threat Intelligence Vendor Landscape at RSA Conference 2018

Cyber Defense Magazine will be releasing our first Quarterly Vendor Landscape report at the RSA Conference 2018. …

Nation State Attacks Continue Unimpeded; So Why Haven’t We Stopped Them?

There’re no big surprises in the recent Technical Alert issued by the Department of Homeland Security (DHS)…

Introduction to Machine Learning (ML) for Cybersecurity

Time to a breach.  Time to detect.  Time to react.  What’s your exposure time?  Gary Miliefsky, the…

Show Buttons
Hide Buttons