Call us Toll Free (USA): 1-833-844-9468     International: +1-603-280-4451 M-F 8am to 6pm EST

CDM, the world's top cybersecurity magazine is celebrating 12 years anniversary.

Read, listen, learn, watch, or write for us and be a part of the global cyber security community.

Tips for Detecting and Preventing Multi-Channel Impersonation Attacks

Recently, the CEO of the world’s biggest advertising group, Mark Read, was the target of a deepfake scam using an AI-based voice clone. Read disclosed that scammers used a publicly available photo…

Abhilash GarimellaAbhilash Garimella
Bolster AI
September 13, 2024

Download Cyber Defense Magazine September Edition
for 2024

Published monthly by Cyber Defense Magazine, this resource shares a wealth of information to help you stay one step ahead of the next cyber threat.

GDPR & CCPA: A CIO’s Essential Guide to Email Compliance

Imagine a world where your inbox isn’t a monster overflowing with junk. A world where you can be confident your emails are safe and secure. That’s the power of email…

Shanky GuptaShanky Gupta
yourDMARC

AI in Cybersecurity: Understanding Challenges, Opportunities and New Approaches

Artificial intelligence (AI) has rapidly reshaped the cybersecurity landscape and simultaneously presents both exciting advancements while also introducing new challenges. As AI’s role in the tactics of both cyber attackers…

Matthew PinesMatthew Pines
PinnacleOne

Cyber Threats vs. Risks: Building a Proactive Cyber Defense

As cybersecurity threats continue to evolve in the ever-changing cyber landscape, organizations within every industry must implement a comprehensive security strategy to remain resilient in the face of attacks. While…

George JonesGeorge Jones
Critical Start

Best Practices for Enterprise Security

Cyberattacks and data breaches are running rampant in enterprises, causing havoc and interrupting business operations. These nuisances are the last thing an organization wants to experience and can cause long-lasting…

Anurag LalAnurag Lal
NetSfere

Why Legacy MFA is DOA

Multi-Factor Authentication (MFA) has long been heralded as a cornerstone of secure digital practices. However, the traditional forms of MFA, now often referred to as “legacy MFA,” are increasingly seen…

Kevin SuraceKevin Surace
Token

Headline-Stealing Hacks Involving AI-Based Voice Chatbots & Automated MSPs

Every new technology trend opens up new attack vectors for cybercriminals. With an ongoing cybersecurity skills shortage, the need for Managed Service Providers (MSPs), unified security and automated platforms to…

Marc LaliberteMarc Laliberte
WatchGuard Technologies
SPOTLIGHT

Innovator Spotlight: Expel

Leading the Charge in Managed Detection and Response by Samridhi Agarwal, Master’s Student, CMU In a conversation with Greg Notch, CISO at Expel, explored the increasing sophistication of cyber threats,…

Samridhi AgarwalSamridhi Agarwal
CDM
September 12, 2024
POPULAR

Massive Data Breach at National Public Data Exposes 2.7 Billion Records

In a major cybersecurity incident, National Public Data, a company that specializes in collecting and aggregating public records, has suffered a massive data breach that exposed 2.7 billion records. The…

Understanding the Dark Web: What You Need to Know

Exploring the Dark Web: Essential Insights Revealed By Elena Thomas, Digital Content Strategist, SafeAeon Inc. The internet is like a huge iceberg: there is a hidden layer below the top….

Combating Cyber-attacks with Threat-Intelligence

Navigate the threat intelligence market’s journey through the digital domain and how it integrates to provide a better solution. By Deboleena Dutta, Junior Content Writer, Research Nester In today’s digitally…

Why Do Hackers Love Cryptocurrency?

Cyber criminals and hackers love cryptocurrency because it’s off the books and is perfect for moving illegal payments and demanding ransom. Ransomware is a type of malicious software designed to…

Insights from RSA Conference 2024: Transformative Innovations in Cybersecurity

Beyond the Buzz Word AI, the Practical Groundbreaking Stuff By Samridhi Agarwal, Masters Student, CMU My first RSA Conference! Oh, what a blast it was! Attending the RSA Conference has…

The Tech Jobs That AI Will Not Disrupt

By Michael Gibbs, CEO — Go Cloud Careers Artificial intelligence is the most exciting innovation to hit the tech world in decades. It has unleashed new capabilities that promise to…

How to interpret the 2023 MITRE ATT&CK Evaluation results

Thorough, independent tests are a vital resource as cybersecurity leaders and their teams evaluate vendors’ abilities to guard against increasingly sophisticated threats to their organization. And perhaps no assessment is…

The Role of AI in Cybersecurity

By Alysia Silberg, CEO, Street Global As technology increasingly connects us, people, businesses, and governments are more concerned with Cybersecurity than ever before. The development of Artificial Intelligence (AI) provides…

TOP 100 IN CYBERSECURITY
cyberdefensegenius - ai chatbot

12th Anniversary Top InfoSec Innovator & Black Unicorn Awards for 2024 are now Open! Winners Notified at CyberDefenseCon 2024...

X