Call us Toll Free (USA): 1-833-844-9468     International: +1-603-280-4451 M-F 8am to 6pm EST

CDM, the world's top cybersecurity magazine is celebrating 13 years anniversary.

Read, listen, learn, watch, or write for us and be a part of the global cyber security community.

The Age of Unseen Truths And Deceptive Lies

From the moment we’re born, we are surrounded by a mix of true and false information. In the past, distinguishing between them was relatively easy, but over time, it has…

Julio PadilhaJulio Padilha
Volkswagen | Audi South America
January 24, 2025

Download Cyber Defense Magazine January Edition
for 2025

Published monthly by Cyber Defense Magazine, this resource shares a wealth of information to help you stay one step ahead of the next cyber threat.

Tagged Files as a Road to Insider Threats

The insider threat is any individual within community who does something against such surrounding even being used for sabotage, diversion, espionage and the other purposes, so far. On the other…

Milica D. DjekicMilica D. Djekic

The Power of Many: Crowdsourcing as A Game-Changer for Modern Cyber Defense

With the rapid technological advancement and the world entering the AI era, the cyber threat landscape has significantly evolved in its complexity and sophistication. The frequency of data breaches has…

Alla YurchenkoAlla Yurchenko
SOC Prime

Operational Security: The Backbone of Effective Police Communication

In the fast-paced and dynamic world of law enforcement, effective communication is essential for ensuring public safety and successful operations. However, amidst the ever-evolving landscape of technology and threats, maintaining…

Nicole HeronNicole Heron
Salt Communications

The Cyber Resilience Act: How Manufacturers Can Meet New EU Standards and Strengthen Product Security

Cybersecurity has become a leading priority for manufacturers of embedded systems and IoT devices. The rapid proliferation of these technologies, combined with their increasing integration into critical infrastructure, has made…

Eystein StenbergEystein Stenberg
Northern.tech

Passwords Are Out, Biometrics Are In

As more aspects of daily life move online—including financial transactions, government services like mobile driver’s licenses, and digital travel authentication—the weaknesses of traditional remote identity verification methods, such as passwords,…

Ajay AmlaniAjay Amlani
iProov

Securing Election Integrity In 2024: Navigating the Complex Landscape of Modern Threats

As we navigate the 2024 election year, safeguarding the integrity of our democratic process is more critical than ever. While much attention has been focused on securing ballot machines, the…

Karl SiglerKarl Sigler
Trustwave SpiderLabs
SPOTLIGHT

Publisher’s Spotlight: Merlin Group

Bridging the Gap Between Cyber Innovation and Regulated Markets Addressing the Challenge of Innovation Access in Regulated Markets In an era where the need for technological innovation is more critical…

Gary MiliefskyGary Miliefsky
January 14, 2025
POPULAR

Start PII Leak Detection and Data Flow Mapping Where It Matters Most: In the Code

Quick link: Learn more about how HoundDog.ai is transforming AppSec and data security at HoundDog.ai. In 2023, 92% of data breaches involved Personally Identifiable Information (PII)—a staggering and growing trend…

Sacumen Advances to the Front Line of Thought Leadership: Accelerates Cybersecurity Integration with Innovative Program

Cyber Defense Magazine Thought Leadership Interview with Nitesh Sinha, Founder and CEO of Sacumen and Praneeth Kudithipudi EVP Sales of Sacumen By Yan Ross, CDM Editor-in-Chief Editor’s Note: Cyber Defense…

The MDR That Sees It All

Unmonitored infrastructure is a major source of initial compromises for enterprises.  The Critical Start MDR solution counters this with endpoint coverage gap monitoring, log ingestion failure alerts, and hidden asset…

Massive Data Breach at National Public Data Exposes 2.7 Billion Records

In a major cybersecurity incident, National Public Data, a company that specializes in collecting and aggregating public records, has suffered a massive data breach that exposed 2.7 billion records. The…

Understanding the Dark Web: What You Need to Know

Exploring the Dark Web: Essential Insights Revealed By Elena Thomas, Digital Content Strategist, SafeAeon Inc. The internet is like a huge iceberg: there is a hidden layer below the top….

Combating Cyber-attacks with Threat-Intelligence

Navigate the threat intelligence market’s journey through the digital domain and how it integrates to provide a better solution. By Deboleena Dutta, Junior Content Writer, Research Nester In today’s digitally…

Why Do Hackers Love Cryptocurrency?

Cyber criminals and hackers love cryptocurrency because it’s off the books and is perfect for moving illegal payments and demanding ransom. Ransomware is a type of malicious software designed to…

Insights from RSA Conference 2024: Transformative Innovations in Cybersecurity

Beyond the Buzz Word AI, the Practical Groundbreaking Stuff By Samridhi Agarwal, Masters Student, CMU My first RSA Conference! Oh, what a blast it was! Attending the RSA Conference has…

TOP 100 IN CYBERSECURITY
cyberdefensegenius - ai chatbot

13th Anniversary Global InfoSec Awards for 2025 now open for early bird packages! Winners Announced during RSAC 2025...

X