Call us Toll Free (USA): 1-833-844-9468     International: +1-603-280-4451 M-F 8am to 6pm EST

CDM, the world's top cybersecurity magazine is celebrating 12 years anniversary.

Read, listen, learn, watch, or write for us and be a part of the global cyber security community.

Lockin Company’s Approach to Zero Trust Security and Rising Phishing Threats with its security software LIAPP, LIKEY, and LISS

LIAPP (Lockin App Protector) is an integrated mobile app security service developed by Lockin Company, a Korean-based security company dedicated to mobile apps protection, that protects over 2,000 apps worldwide….

Gary MiliefskyGary Miliefsky
Cyber Defense Magazine
October 2, 2024

Download Cyber Defense Magazine October Edition
for 2024

Published monthly by Cyber Defense Magazine, this resource shares a wealth of information to help you stay one step ahead of the next cyber threat.

The Next Iteration of Privacy: What Businesses Should Know About New Privacy Laws in Oregon, Texas, and Florida

As businesses enter the third quarter of 2024, they need to contend with three new state privacy laws. The Texas Data Privacy and Security Act, Oregon Consumer Privacy Act, and…

Carolyn HoCarolyn Ho
Constangy, Brooks, Smith & Prophete LLP

What CIRCIA Means for Critical Infrastructure Providers and How Breach and Attack Simulation Can Help

On July 3rd the period for public comment closed for the U.S. Cybersecurity and Infrastructure Security Agency’s proposed Cyber Incident Reporting for Critical Infrastructure Act of 2022 (CIRCIA) reporting rules…

Guy BejeranoGuy Bejerano
SafeBreach

Cybersecurity In Critical Infrastructure: Protecting Power Grids and Smart Grids

Infrastructure like water system, supply system, telecommunication networks, and power plants are critical assets for any country in that the destruction and incapacity of such systems poses an adverse effect…

Kehinde AyanoKehinde Ayano
Indiana Wesleyan University

From Burnout to Balance: How AI Supports Cybersecurity Professionals

As technology advances, cyber threats are becoming more complex and harder to combat. According to Cobalt’s State of Pentesting Report, this past year, the number of security vulnerabilities increased by 21%,…

Jason LamarJason Lamar
Cobalt

Getting Out in Front of Post-Quantum Threats with Crypto Agility

Ready or not, quantum computing technology is rapidly advancing, and its new capabilities will be available sooner than most think. Quantum technology has the potential to transform applications like materials…

Dr. Avesta HojjatiDr. Avesta Hojjati
DigiCert

Top Tips and Risks Ahead of the 2024 Olympic Games

As buzz and excitement continues to build around the upcoming 2024 Summer Olympics, it is important to be aware of the potential cyberthreats that often target such large global events. The…

Narayana PappuNarayana Pappu
Zendata
SPOTLIGHT

Innovator Spotlight: Guardio

Cyber threats are becoming more sophisticated, putting both individuals and businesses at significant risk. The rise in phishing attacks, identity theft, and online fraud highlights the urgent need for accessible…

Pete GreenPete Green
CDM
September 27, 2024
POPULAR

The MDR That Sees It All

Unmonitored infrastructure is a major source of initial compromises for enterprises.  The Critical Start MDR solution counters this with endpoint coverage gap monitoring, log ingestion failure alerts, and hidden asset…

Massive Data Breach at National Public Data Exposes 2.7 Billion Records

In a major cybersecurity incident, National Public Data, a company that specializes in collecting and aggregating public records, has suffered a massive data breach that exposed 2.7 billion records. The…

Understanding the Dark Web: What You Need to Know

Exploring the Dark Web: Essential Insights Revealed By Elena Thomas, Digital Content Strategist, SafeAeon Inc. The internet is like a huge iceberg: there is a hidden layer below the top….

Combating Cyber-attacks with Threat-Intelligence

Navigate the threat intelligence market’s journey through the digital domain and how it integrates to provide a better solution. By Deboleena Dutta, Junior Content Writer, Research Nester In today’s digitally…

Why Do Hackers Love Cryptocurrency?

Cyber criminals and hackers love cryptocurrency because it’s off the books and is perfect for moving illegal payments and demanding ransom. Ransomware is a type of malicious software designed to…

Insights from RSA Conference 2024: Transformative Innovations in Cybersecurity

Beyond the Buzz Word AI, the Practical Groundbreaking Stuff By Samridhi Agarwal, Masters Student, CMU My first RSA Conference! Oh, what a blast it was! Attending the RSA Conference has…

The Tech Jobs That AI Will Not Disrupt

By Michael Gibbs, CEO — Go Cloud Careers Artificial intelligence is the most exciting innovation to hit the tech world in decades. It has unleashed new capabilities that promise to…

How to interpret the 2023 MITRE ATT&CK Evaluation results

Thorough, independent tests are a vital resource as cybersecurity leaders and their teams evaluate vendors’ abilities to guard against increasingly sophisticated threats to their organization. And perhaps no assessment is…

TOP 100 IN CYBERSECURITY
cyberdefensegenius - ai chatbot

12th Anniversary Top InfoSec Innovator & Black Unicorn Awards for 2024 remain open for late entries! Winners Announced October 31, 2024...

X