Call us Toll Free (USA): 1-833-844-9468     International: +1-603-280-4451 M-F 8am to 6pm EST

CDM, the world's top cybersecurity magazine is celebrating 13 years anniversary.

Read, listen, learn, watch, or write for us and be a part of the global cyber security community.

Have the Last Word Against Ransomware with Immutable Backup

With incidences of ransomware on the rise, nobody should even be thinking that an attack is something that couldn’t happen to them, let alone speak those words into existence. And…

Judy KaldenbergJudy Kaldenberg
Nexsan
February 14, 2025

Download Cyber Defense Magazine February Edition
for 2025

Published monthly by Cyber Defense Magazine, this resource shares a wealth of information to help you stay one step ahead of the next cyber threat.

RASP (Runtime Application Self-Protection) in Mobile Application Security: A Strategic Imperative for the Modern Threat Landscape

Introduction The mobile application landscape is more dynamic and challenging than ever, with businesses increasingly relying on mobile channels to drive customer engagement, streamline operations, and generate revenue. Yet, this…

Md Zaid ImamMd Zaid Imam
INKA NETWORKS

Deciphering End User Data Access Patterns is Key to a Strong SaaS Security Posture

It’s all about patterns. Long before cybersecurity was on anyone’s radar, defensive intelligence – like catching an enemy spy in your ranks – was about being able to recognize patterns…

Adam GavishAdam Gavish
DoControl

Experience from GAP Assessment Audits for NIS2 Compliance

The NIS2 (Directive (EU) 2022/2555 of the European Parliament and of the Council) imposes cybersecurity and information security compliance obligations on many organizations that previously had no such requirements. Most…

Zsolt BaranyaZsolt Baranya
Black Cell Ltd

Building Contextual Data Models for Identity Related Threat Detection & Response (ITDR)

Amid the rising pace of digitization, a growing number of organizations are managing their workloads based on a hybrid model. A hybrid model by design leads to dispersion of corporate…

Anil BhandariAnil Bhandari
ARCON

Incident Response Planning: A Portion of Planning is Worth a Pound of Gold

When you are hacked, you want to recapture control quickly as hackers move through systems, locking sensitive information and holding it for ransom. You need to determine the extent of…

Chris SnyderChris Snyder
Quadrant Security

Deepfakes: How Deep Can They Go?

With the help of today’s technology, virtually anyone can create a passable deepfake—a manipulated image, video, or audio recording that seems real. All that is required is a consumer-grade computer…

Arik AtarArik Atar
Radware
SPOTLIGHT

Publishers Spotlight: Flashpoint

In 2024, a new hybrid cold war is redefining the threat landscape. Cyber, physical, and geopolitical risks are converging, with nation-states, ransomware groups, and insider threats exploiting vulnerabilities to disrupt…

Gary MiliefskyGary Miliefsky
February 13, 2025
POPULAR

Start PII Leak Detection and Data Flow Mapping Where It Matters Most: In the Code

Quick link: Learn more about how HoundDog.ai is transforming AppSec and data security at HoundDog.ai. In 2023, 92% of data breaches involved Personally Identifiable Information (PII)—a staggering and growing trend…

Sacumen Advances to the Front Line of Thought Leadership: Accelerates Cybersecurity Integration with Innovative Program

Cyber Defense Magazine Thought Leadership Interview with Nitesh Sinha, Founder and CEO of Sacumen and Praneeth Kudithipudi EVP Sales of Sacumen By Yan Ross, CDM Editor-in-Chief Editor’s Note: Cyber Defense…

The MDR That Sees It All

Unmonitored infrastructure is a major source of initial compromises for enterprises.  The Critical Start MDR solution counters this with endpoint coverage gap monitoring, log ingestion failure alerts, and hidden asset…

Massive Data Breach at National Public Data Exposes 2.7 Billion Records

In a major cybersecurity incident, National Public Data, a company that specializes in collecting and aggregating public records, has suffered a massive data breach that exposed 2.7 billion records. The…

Understanding the Dark Web: What You Need to Know

Exploring the Dark Web: Essential Insights Revealed By Elena Thomas, Digital Content Strategist, SafeAeon Inc. The internet is like a huge iceberg: there is a hidden layer below the top….

Combating Cyber-attacks with Threat-Intelligence

Navigate the threat intelligence market’s journey through the digital domain and how it integrates to provide a better solution. By Deboleena Dutta, Junior Content Writer, Research Nester In today’s digitally…

Why Do Hackers Love Cryptocurrency?

Cyber criminals and hackers love cryptocurrency because it’s off the books and is perfect for moving illegal payments and demanding ransom. Ransomware is a type of malicious software designed to…

Insights from RSA Conference 2024: Transformative Innovations in Cybersecurity

Beyond the Buzz Word AI, the Practical Groundbreaking Stuff By Samridhi Agarwal, Masters Student, CMU My first RSA Conference! Oh, what a blast it was! Attending the RSA Conference has…

TOP 100 IN CYBERSECURITY
cyberdefensegenius - ai chatbot

13th Anniversary Global InfoSec Awards for 2025 now open for early bird packages! Winners Announced during RSAC 2025...

X