Publisher’s Spotlight: THREATX – A Cloud-Native Solution for Runtime API & App Protection

Did you know that only 4% of CISOs have real-time visibility into runtime vulnerabilities in containerized production environments (https://www.dynatrace.com/news/blog/runtime-vulnerability-management-still-vexing-organizations/)?  According to Gartner, by 2025, over 75 percent of organizations will […]

Posted in Cyber Security News, Featured | Comments Off on Publisher’s Spotlight: THREATX – A Cloud-Native Solution for Runtime API & App Protection

Product Review of Specops Password Policy

Looking for a tool to validate if your Active Directory (AD) passwords are safe across your Enterprise? Why would this be important? There are a few solutions in the industry […]

Posted in Cyber Security News, Featured | Comments Off on Product Review of Specops Password Policy

Surviving and Thriving the Hacker Summer Camp

A Cybersecurity Student’s First Time Experience with DefCon, BlackHat, and The Diana Initiative Annabelle Klosterman, Cybersecurity Reporter, Cyber Defense Magazine Earlier in August, I experienced my first Hacker Summer Camp […]

Posted in Cyber Security News, Featured | Comments Off on Surviving and Thriving the Hacker Summer Camp

Source Code Protection Market

Do we need backup software for DevOps ecosystems? By Marta Przybylska, Marketing Manager, GitProtect.io / Xopero Software   Today, the software is the driving force of the world, and developers […]

Posted in Cyber Security News, Featured | Comments Off on Source Code Protection Market

Hacking The Cybersecurity Field: How To Get Into Cyber As A Young Adult

“What do you want to be when you grow up?” was the question I heard over and over again as a middle and high school student, but I could never […]

Posted in Cyber Security News, Featured | Comments Off on Hacking The Cybersecurity Field: How To Get Into Cyber As A Young Adult

KB4-CON 2022: Awareness, Behavior and Culture: Trip Report

After two years of virtual events, I was thrilled to attend KB4-CON 2022, run by KnowBe4, Inc., which took place in the Gaylord Palms Resort & Convention Center in Orlando, […]

Posted in Cyber Security News, Featured | Comments Off on KB4-CON 2022: Awareness, Behavior and Culture: Trip Report

Cyber Defense Media Group Opens Young Women in Cybersecurity Scholarship for 2022

Cyber Defense Media Group (CDMG), who has launched our 10th annual cybersecurity community awards this year today announced that it has re-opened its annual young Women in Cybersecurity scholarship program […]

Posted in Cyber Security News, Featured | Comments Off on Cyber Defense Media Group Opens Young Women in Cybersecurity Scholarship for 2022

The 7 Top Cybersecurity Conferences for 2022

While there are many more cybersecurity tradeshows events and gatherings these are my seven favorites for 2022 in that they all have a unique atmosphere and always great content.   Here […]

Posted in Cyber Security News, Featured | Comments Off on The 7 Top Cybersecurity Conferences for 2022

Cyber Defense Media Group Launches CyberDefenseCon 2022

On the heels of its 10th anniversary, Cyber Defense Media Group announces the exclusive Cyber Defense Conference for 2022 a.k.a. CyberDefenseCon 2022. This event will be taking place in Orlando, […]

Posted in Cyber Security News, Featured | Comments Off on Cyber Defense Media Group Launches CyberDefenseCon 2022

Cyber Defense Media Group – 10 Year Anniversary – Daily Celebration in 2022

IT’S A BIG, BOLD, BEAUTIFUL 2022 – OUR 10TH ANNIVERSARY  We’re celebrating this milestone every day this year in different, exciting and creative ways. We’re expanding our teams, platforms and […]

Posted in Cyber Security News, Featured | Tagged | Comments Off on Cyber Defense Media Group – 10 Year Anniversary – Daily Celebration in 2022

December 2021: Cyber Deception Month Continues…Today’s Cyber Deception Tools Are Straight Out of Science Fiction

Authored by: Carolyn Crandall, Chief Security Advocate, Attivo Networks When it comes to predicting the future, the science fiction genre has taken some big swings over the years. Unfortunately, it’s […]

Posted in Cyber Security News, Featured | Tagged , , , | Comments Off on December 2021: Cyber Deception Month Continues…Today’s Cyber Deception Tools Are Straight Out of Science Fiction

December 2021: Cyber Deception Month Continues…Halting Holiday Hackers…

Authored by: Gary Miliefsky of Cyber Defense Magazine Deep fake, dropped USB sticks, free offers, vishing, smishing and deep phishing attacks, smart-everything (weak IoT devices), malicious apps, driveby malware, distributed […]

Posted in Cyber Security News, Featured | Comments Off on December 2021: Cyber Deception Month Continues…Halting Holiday Hackers…

December 2021: Cyber Deception Month

How Bad Are The Breaches? Please take the time to visit a visual mapping of the largest breaches… http://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks/ Which I shortened for you… https://tinyurl.com/CDMG-DEC-2021  (you can trust me, I’m […]

Posted in Cyber Security News, Featured | Tagged , , , , , , | Comments Off on December 2021: Cyber Deception Month

Get A Great Job in Cyber Security Faster, Here’s How…

Looking for a Hot High Paying Cyber Security Job?  Look No Further – Enter CyberDefenseProfessionals.com In the third quarter of 2021, Cyber Defense Media Group, the cybersecurity industry’s leading publisher […]

Posted in Cyber Security News, Featured | Comments Off on Get A Great Job in Cyber Security Faster, Here’s How…

Container Technology Energizes Edge Computing

The security, portability, and agility of container technology complement the proven capabilities of the leading real-time operating system (RTOS), VxWorks®, now available for containerized deployments at the intelligent edge. As […]

Posted in Cyber Security News, Featured | Comments Off on Container Technology Energizes Edge Computing

Active Directory is Now The Number One Target of Hackers – Learn How to Harden It – Today!

Register for our Free eBook:  The Secrets of Hardening Active Directory eBook Your Active Directory servers have now become a major target for exploiters.  It is not if it will […]

Posted in Cyber Security News, Featured | Tagged , , , , , , , , , , , , , , , | Comments Off on Active Directory is Now The Number One Target of Hackers – Learn How to Harden It – Today!

Cybersecurity experts’ advice: how to become cyber-resilient [Live Webinar] Sept 23, 2021

Cyber Defense Magazine predicts: by 2025, cybercrime will cost the world $12 trillion annually. Today, cyber threats are no longer limited to computers. Anything with an electronic pulse is at […]

Posted in Cyber Security News | Tagged , , | Comments Off on Cybersecurity experts’ advice: how to become cyber-resilient [Live Webinar] Sept 23, 2021

Cyber Defense Media Group Launches our 10th Anniversary Contest

CDMG – 10th Anniversary – Trip to Walt Disney World Contest – up to $10,000.00 USD in Value – Contest begins September 15, 2021 and ends on December 15, 2021. January, […]

Posted in Cyber Security News, Featured | Tagged , , , | Comments Off on Cyber Defense Media Group Launches our 10th Anniversary Contest

The Preventable Aspects of the APT40 Microsoft Hack

On January 19th, the United States Department of Justice (DOJ) charged four Chinese nationals—Cheng Qingmin (程庆民), Wu Shurong (吴淑荣), Ding Xiaoyang (丁晓阳), and Zhu Yunmin (朱允敏)—with computer fraud and economic […]

Posted in Cyber Security News, Featured | Comments Off on The Preventable Aspects of the APT40 Microsoft Hack

Extended Detection and Response (XDR) Needs a New Kill Chain

When it comes to spotting and defeating today’s advanced cyberattacks, the predominant kill chains used in security products clearly aren’t up to the task. New attacks occur every day, and […]

Posted in Cyber Security News, Featured | Comments Off on Extended Detection and Response (XDR) Needs a New Kill Chain

If the recent attack on Microsoft is Chinese Government State Sponsored, isn’t it time for a Cyber Geneva Convention?

State sponsored cyber hacking, espionage, ransomware and other attacks (mainly to steal trade secrets) needs to come to a screetching halt. My simple humble suggestion, change all firewall and router […]

Posted in Cyber Security News, Featured | Comments Off on If the recent attack on Microsoft is Chinese Government State Sponsored, isn’t it time for a Cyber Geneva Convention?

Cyber Defense Magazine Announces Winners of the Global InfoSec Awards 2021

Cyber Defense Magazine (CDM), the industry’s leading electronic information security magazine has spent the past six months scouring the globe and found 3,200 companies who create and offer the most […]

Posted in Cyber Security News, Featured | Comments Off on Cyber Defense Magazine Announces Winners of the Global InfoSec Awards 2021

Chinese Leader Xi Jinping Lays out Plan to Control the Global Internet: Leaked Documents

[EXCERPT] Chinese leader Xi Jinping personally directed the communist regime to focus its efforts to control the global internet, displacing the influential role of the United States, according to internal […]

Posted in Cyber Security News, Featured | Comments Off on Chinese Leader Xi Jinping Lays out Plan to Control the Global Internet: Leaked Documents

The 5 Biggest Mistakes in SD-WAN Security

2020 taught organizations that the traditional 9-5 office is a thing of the past. Not only has the idea of employees’ location has changed but also the central network infrastructures […]

Posted in Cyber Security News, Featured | Tagged , , , | Comments Off on The 5 Biggest Mistakes in SD-WAN Security

Attivo Networks Launches ADAssessor for Continuous Visibility to Active Directory Security Exposures

Attivo Networks, the leader in lateral movement attack detection and privilege escalation prevention, has expanded its Active Directory (AD) protection suite of products with a new and innovative way to […]

Posted in Cyber Security News, Featured | Tagged , , , , , , | Comments Off on Attivo Networks Launches ADAssessor for Continuous Visibility to Active Directory Security Exposures

Top 100 Cybersecurity Universities

Ranking the best schools in the world with cybersecurity programs is a difficult feat. You can’t really say that one school is better than another because one school may have […]

Posted in Cyber Security News, Featured, Top 100 | Tagged , , , , , , , , , , , , , | Comments Off on Top 100 Cybersecurity Universities

Top 100 Cybersecurity Breaches

Looking back over the past year, it’s impossible not to recognize the widespread data breaches that have caused such chaos. Secret and sensitive data of hundreds of millions of people […]

Posted in Cyber Security News, Featured, Top 100 | Tagged , , , , , , , , , , | Comments Off on Top 100 Cybersecurity Breaches

Top 100 Cybersecurity Hackers

The following list, in no particular order, contains the names, their countries of origins, their (biggest) victim (s) and a short piece about who they are.  Some are reformed and […]

Posted in Cyber Security News, Featured, Top 100 | Tagged , , , | Comments Off on Top 100 Cybersecurity Hackers

Top 100 Managed Security Service Providers (MSSPs)

Well, let’s start with the basics. What is MSSP? It is short for Managed Security Service Provider. As the name suggests MSSPs are providers of different managerial security services. Examples […]

Posted in Cyber Security News, Featured, Top 100 | Tagged , , , , , | Comments Off on Top 100 Managed Security Service Providers (MSSPs)

Top 100 Cybersecurity Movies

The Computer Wore Tennis Shoes (1969) In The Computer Wore Tennis Shoes, Kurt Russell stars as an underachieving college student whose intellectual capabilities skyrocket after an electrical accident with a […]

Posted in Cyber Security News, Featured, Top 100 | Tagged , , | Comments Off on Top 100 Cybersecurity Movies

12th Anniversary Global InfoSec Awards for 2024 are now Open! Take advantage of co-marketing packages and enter today!

X