Call us Toll Free (USA): 1-833-844-9468     International: +1-603-280-4451 M-F 8am to 6pm EST

CDM, the world's top cybersecurity magazine is celebrating 12 years anniversary.

Read, listen, learn, watch, or write for us and be a part of the global cyber security community.

Halting Hackers on the Holidays: Protecting Yourself from Seasonal Cyber Threats

by Gary S. Miliefsky, CISSP, fmDHS Ho-ho-hold on to your data! 🎅 The holiday season is here, bringing cheer, gifts, and…cybercriminals?! That’s right! While you’re decking the halls, hackers are…

Gary MiliefskyGary Miliefsky
December 6, 2024

Download Cyber Defense Magazine December Edition
for 2024

Published monthly by Cyber Defense Magazine, this resource shares a wealth of information to help you stay one step ahead of the next cyber threat.

Preparing for EU AI Act from a Security Perspective

The world’s first artificial intelligence law, the EU AI Act, finally came into effect on 1 Aug 2024, 4 years after it was initially proposed by the European Commission. After…

Manpreet DashManpreet Dash
AIShield

Shifting The Focus: From Compliance to Secops In Supply Chain Security

There are two main reasons why supply chain attacks are on the increase. First, there is a general trend of companies outsourcing more critical business functions to external providers, and…

Emily HodgesEmily Hodges
Risk Ledger

The Initial Engagement Process for Contracting with a vCISO

Introduction In today’s fast-paced digital world, organizations face a myriad of cybersecurity challenges that demand expert guidance and strategic oversight. Enter the Virtual Chief Information Security Officer (vCISO), a role…

Pete GreenPete Green
GuidePoint Security

How AI Helps Security Teams at Samsara and Ekco Move Faster and Enhance Decision-Making

Despite the enormous potential of AI, its impact on security operations has often fallen short, with teams grappling with privacy concerns, misaligned priorities, and overhyped vendor promises. Yet, security teams at…

TinesTines

Lessons from the Global IT Outage of July 19, 2024

On Friday, July 19, 2024, the world experienced a massive IT outage that disrupted businesses, governments, and other users across the globe. The outage impacted numerous critical services—most notably medical…

Andrew DouthwaiteAndrew Douthwaite
VirtualArmour

Apple & OpenAI’s New Features: A First Look Through the Eyes of the US’ First Female CIO

Even before my time in The White House, I was – and continue to be – captivated by the intersection of technology and policy, which is why Apple’s recent announcement of…

Theresa PaytonTheresa Payton
Fortalice Solutions
SPOTLIGHT

Innovator Spotlight: Sumo Logic

The rapid adoption of cloud and digital services is driving exponential data growth, creating fragmented visibility and operational silos across Dev, Sec, and Ops teams. According to the IDC, the…

Dan K. AndersonDan K. Anderson
November 25, 2024
POPULAR

The MDR That Sees It All

Unmonitored infrastructure is a major source of initial compromises for enterprises.  The Critical Start MDR solution counters this with endpoint coverage gap monitoring, log ingestion failure alerts, and hidden asset…

Massive Data Breach at National Public Data Exposes 2.7 Billion Records

In a major cybersecurity incident, National Public Data, a company that specializes in collecting and aggregating public records, has suffered a massive data breach that exposed 2.7 billion records. The…

Understanding the Dark Web: What You Need to Know

Exploring the Dark Web: Essential Insights Revealed By Elena Thomas, Digital Content Strategist, SafeAeon Inc. The internet is like a huge iceberg: there is a hidden layer below the top….

Combating Cyber-attacks with Threat-Intelligence

Navigate the threat intelligence market’s journey through the digital domain and how it integrates to provide a better solution. By Deboleena Dutta, Junior Content Writer, Research Nester In today’s digitally…

Why Do Hackers Love Cryptocurrency?

Cyber criminals and hackers love cryptocurrency because it’s off the books and is perfect for moving illegal payments and demanding ransom. Ransomware is a type of malicious software designed to…

Insights from RSA Conference 2024: Transformative Innovations in Cybersecurity

Beyond the Buzz Word AI, the Practical Groundbreaking Stuff By Samridhi Agarwal, Masters Student, CMU My first RSA Conference! Oh, what a blast it was! Attending the RSA Conference has…

The Tech Jobs That AI Will Not Disrupt

By Michael Gibbs, CEO — Go Cloud Careers Artificial intelligence is the most exciting innovation to hit the tech world in decades. It has unleashed new capabilities that promise to…

How to interpret the 2023 MITRE ATT&CK Evaluation results

Thorough, independent tests are a vital resource as cybersecurity leaders and their teams evaluate vendors’ abilities to guard against increasingly sophisticated threats to their organization. And perhaps no assessment is…

TOP 100 IN CYBERSECURITY
cyberdefensegenius - ai chatbot

13th Anniversary Global InfoSec Awards for 2025 now open for early bird packages! Winners Announced during RSAC 2025...

X