Call us Toll Free (USA): 1-833-844-9468     International: +1-603-280-4451 M-F 8am to 6pm EST

CDM, the world's top cybersecurity magazine is celebrating 12 years anniversary.

Read, listen, learn, watch, or write for us and be a part of the global cyber security community.

Healthcare Industry Under Siege: Latest String of Ransomware Attacks Renews Emphasis on Cybersecurity Defenses

As the ransomware threat landscape continues to wreak havoc on industries across the nation, healthcare providers all over the country are having difficulties receiving payment due to an attack that…

Joao CorreiaJoao Correia
TuxCare
July 15, 2024

Download Cyber Defense Magazine July Edition
for 2024

Published monthly by Cyber Defense Magazine, this resource shares a wealth of information to help you stay one step ahead of the next cyber threat.

The Role of Human Error in Data Spillage Incidents

Unraveling Human Factors in Data Breaches Data spillage is a term used to describe the exposure of sensitive or classified information outside an organization’s designated boundary of network or safety…

Anirudh SainiAnirudh Saini
BuzzClan

The Morphing of Misinformation in a Super Election Year

Security a Top Concern During 2024 Election ‘Super-Cyle’ With an unprecedented ‘super-cycle’ of elections in 2024, almost half the world’s population will go to the polls before the year is…

Srdjan TodorovicSrdjan Todorovic
Allianz Commercial

Overcome AI-Oriented Phishing Attacks with These Sure-Fire Strategies

Artificial intelligence is an ever-evolving subject; year by year, its landscape is expanding to different industries, and the outcome of its optimization is noteworthy. One of the prominent tech giants,…

Sarrah PitaliyaSarrah Pitaliya
ZeroThreat

New Phishing Campaign Using AI generated Emails, Human Live Chat to Target Social Media Business Accounts

Fraudsters leverage complex phishing scams in attempt to gain control over organizations’ Meta accounts A sophisticated phishing campaign is targeting businesses of every size in an attempt to compromise Facebook…

Michael TylerMichael Tyler
Fortra

Why the MoD Breach Calls for a Cybersecurity Overhaul

The recent cyber attack on the Ministry of Defence, which compromised the personal information of UK military personnel, serves as a stark warning for organisations across the globe and reinforces…

Martin GreenfieldMartin Greenfield
Quod Orbis

How to Prepare for ISO 27001:2022’s Threat Intelligence Requirements

Countdown to October 2025 As the cybersecurity landscape continues to evolve and become more complex, international regulations are similarly following suit to keep pace and set a benchmark to mitigate…

Dr Nick SavageDr Nick Savage
Searchlight Cyber
FEATURED

How to Hunt for Volt Typhoon Malware in Critical Infrastructure

🚨🔍 Don’t miss out on the Hunt for Volt Typhoon event! 🌐💻 Join us to explore cutting-edge cyber tactics, innovative defense strategies, and the latest in threat detection. Perfect for…

Gary MiliefskyGary Miliefsky
Unknown Cyber, Carahsoft
June 20, 2024
POPULAR

Understanding the Dark Web: What You Need to Know

Exploring the Dark Web: Essential Insights Revealed By Elena Thomas, Digital Content Strategist, SafeAeon Inc. The internet is like a huge iceberg: there is a hidden layer below the top….

Combating Cyber-attacks with Threat-Intelligence

Navigate the threat intelligence market’s journey through the digital domain and how it integrates to provide a better solution. By Deboleena Dutta, Junior Content Writer, Research Nester In today’s digitally…

Why Do Hackers Love Cryptocurrency?

Cyber criminals and hackers love cryptocurrency because it’s off the books and is perfect for moving illegal payments and demanding ransom. Ransomware is a type of malicious software designed to…

Insights from RSA Conference 2024: Transformative Innovations in Cybersecurity

Beyond the Buzz Word AI, the Practical Groundbreaking Stuff By Samridhi Agarwal, Masters Student, CMU My first RSA Conference! Oh, what a blast it was! Attending the RSA Conference has…

The Tech Jobs That AI Will Not Disrupt

By Michael Gibbs, CEO — Go Cloud Careers Artificial intelligence is the most exciting innovation to hit the tech world in decades. It has unleashed new capabilities that promise to…

How to interpret the 2023 MITRE ATT&CK Evaluation results

Thorough, independent tests are a vital resource as cybersecurity leaders and their teams evaluate vendors’ abilities to guard against increasingly sophisticated threats to their organization. And perhaps no assessment is…

The Role of AI in Cybersecurity

By Alysia Silberg, CEO, Street Global As technology increasingly connects us, people, businesses, and governments are more concerned with Cybersecurity than ever before. The development of Artificial Intelligence (AI) provides…

Thomas Edison: An Inspiration for Cybersecurity Inventions

As an inventor and patent holder on various cybersecurity inventions and having been involved in the eary days of the internet, including having the opportunity to be in the RFC…

TOP 100 IN CYBERSECURITY
cyberdefensegenius - ai chatbot

12th Anniversary Top InfoSec Innovator & Black Unicorn Awards for 2024 are now Open! Finalists Notified Before BlackHat USA 2024...

X