Call us Toll Free (USA): 1-833-844-9468     International: +1-603-280-4451 M-F 8am to 6pm EST

CDM, the world's top cybersecurity magazine is celebrating 13 years anniversary.

Read, listen, learn, watch, or write for us and be a part of the global cyber security community.

The Future of API Security Reviews

As organizations increasingly rely on application programming interfaces (APIs) to facilitate communication and data exchange between software systems, these “gates” become primary targets for attackers. Businesses that fail to put…

Pushkar JaltarePushkar Jaltare
Fastly
August 9, 2025

Download Cyber Defense Magazine August Edition
for 2025

Published monthly by Cyber Defense Magazine, this resource shares a wealth of information to help you stay one step ahead of the next cyber threat.

SMBs Know the Risks, So Why Are Cybercriminals Still Winning?

Cybercriminals are no longer primarily focused on large enterprises. They now see small- and medium-sized businesses (SMBs) as prime targets because they lack the resources, expertise, and robust security measures…

Kevin PierceKevin Pierce
VikingCloud

Are You Sending the Wrong Signals?

The Salt team has spent the last 5-10 years producing blogs, comparison documents and webinars which highlight our credentials versus consumer apps. To get the message across we frequently reference…

Nicole HeronNicole Heron
Salt Communications

Saas Security Best Practices

Software as a Service (SaaS) is the prevalent software distribution model in the tech industry. Whether you are a young startup founder or a mature business owner, ensuring a robust…

Priyanka NawalramkaPriyanka Nawalramka
HouseCanary

Risk Has Moved Beyond Your Inbox

For years, email was the main security battleground. Phishing, scams, and account takeovers were problems companies knew how to fight—at least in theory. Secure email gateways, AI-driven detection, relentless user…

Jeremy VenturaJeremy Ventura
Myriad360

Retail Budgets at Risk: Price-Scraping and Fraudulent Bot Attacks Are on The Rise

Competition in the eCommerce industry is becoming increasingly rivalled. As consumers turn to online stores, more and more retailers are making the jump themselves and pivoting towards digital. Joining such…

Chad KinlayChad Kinlay
TrafficGuard

Effortless Cloud Security: A Beginner’s Checklist for a Safer Cloud Environment

In the past few years, the world has embraced a new era of AI, introducing an array of security tools that leverage advanced technologies to automate deployments, conduct real-time scanning,…

Ranjan KathuriaRanjan Kathuria
Rubrik Inc.
SPOTLIGHT

Innovator Spotlight: ArmorCode

Cutting Through the Noise: How ArmorCode is Revolutionizing Software Security with AI Code Insights The cybersecurity landscape is drowning in data. Imagine a CISO buried under 1.6 million security findings,…

Pete GreenPete Green
July 24, 2025
POPULAR

Publisher’s Spotlight: NAKIVO Backup & Replication v11

A Powerful, All-in-One Solution for Cyber-Resilient Backup and Recovery In an era where ransomware, cloud complexity, and regulatory pressures are reshaping data protection priorities, NAKIVO Backup & Replication v11 provides…

Countdown to Digital Armageddon: U.S. and Russia on the Brink

by Gary Miliefsky, Publisher, Cyber Defense Magazine In the shadowy corners of the internet, war is already underway. It doesn’t look like the battles of old – no tanks, no…

From Instinct to Impact: How CYE is Redefining Cybersecurity with Data Science and Business Precision

A Conversation with Ira Winkler on Turning Cyber Risk into Measurable Business Value Through the Power of Hyver In a world where cybersecurity is no longer a back-office concern but…

AI Readiness Starts With Identity: Why Gathid Is Leading the Charge

by Gary  Miliefsky, Publisher As artificial intelligence reshapes the cybersecurity landscape, one truth has become abundantly clear: identity and access governance must evolve in lockstep. Enterprises rushing to integrate AI across…

Innovator Spotlight: LatticaAI

Lattica’s Mission: Making Private AI a Reality with the Power of Fully Homomorphic Encryption In the buzz-heavy world of AI and cybersecurity, it’s not every day a company steps out…

MITRE CVE Program in Jeopardy

As a former advisory board member to the CVE/OVAL initiatives, I’m sounding the alarm: MITRE has confirmed that funding for the CVE and CWE programs will expire on April 16,…

The True Cost of Cybercrime: Why Global Damages Could Reach $1.2 – $1.5 Trillion by End of Year 2025

Introduction: The Escalating Economic Threat of Cybercrime Cybercrime is no longer just an IT problem—it has evolved into a global economic crisis, affecting corporations, governments, and individuals alike. With increasing…

High Speed Smishing: The Psychology Behind Toll Road Scams

Ping! A sudden message appears: “Please pay for Toll Road usage on [insert random day here].” Instantly, you find yourself wondering, Where did I go that day? Did I forget…

TOP 100 IN CYBERSECURITY

Top Global CISOs, Top InfoSec Innovators and Black Unicorn Awards Program for 2025 Now Open...

X

Stay Informed. Stay Secure. Read the Latest Cyber Defense eMag

X