Call us Toll Free (USA): 1-833-844-9468     International: +1-603-280-4451 M-F 8am to 6pm EST

CDM, the world's top cybersecurity magazine is celebrating 13 years anniversary.

Read, listen, learn, watch, or write for us and be a part of the global cyber security community.

MITRE CVE Program in Jeopardy

As a former advisory board member to the CVE/OVAL initiatives, I’m sounding the alarm: MITRE has confirmed that funding for the CVE and CWE programs will expire on April 16,…

Gary MiliefskyGary Miliefsky
April 15, 2025

Download Cyber Defense Magazine April Edition
for 2025

Published monthly by Cyber Defense Magazine, this resource shares a wealth of information to help you stay one step ahead of the next cyber threat.

Why Securing Prompts Will Never Be Enough: The GitHub Copilot Case

We’ve spent months analyzing how AI-powered coding assistants like GitHub Copilot handle security risks. The results? Disturbing. The Hidden Risks of AI Code Assistants GitHub Copilot is marketed as a…

Oren SabanOren Saban
Apex Security

Unified Endpoint Management: One Tool to Rule All

As the number of endpoint devices increases, managing and securing them becomes complex. The traditional way of using separate security tools for desktops, mobile devices, tablets, and other endpoints is…

Unnati GhoshUnnati Ghosh
HCLSoftware

Trusted & Resilient Saas Data Is Essential for Successful Agentic AI Within Government Agencies

Government agencies are under immense pressure to modernize, both from the legislature and constituents demanding a digital-first experience. Advances in autonomous AI agents open new opportunities to leverage Software as…

Dr. Eoghan CaseyDr. Eoghan Casey
Salesforce

Training Skillset Transfer

Understanding Skills and Their Importance A skill is an individual’s ability to perform an action efficiently and effectively, providing a significant advantage in problem-solving. Skills go beyond mere knowledge, requiring:…

Milica D. DjekicMilica D. Djekic

Threat Research is Broken – Security Teams Need Automation Now

The battle didn’t begin today, and it’s not ending anytime soon, as cyber threats are changing at a rate never seen before. Today, attackers are getting more and more creative,…

Emmanuel JoshuaEmmanuel Joshua
Amazon

The Invisible Fingerprint in Code

Digital Traces in Code Every program contains characteristic patterns of its developers, starting with the choice of variable names and preferred programming paradigms. Some developers rely on iterative solutions using…

Felix MächtleFelix Mächtle
University of Lübeck
SPOTLIGHT

Publisher’s Spotlight: Industrial Defender

By Gary S. Miliefsky, Publisher, Cyber Defense Magazine In today’s hyperconnected world, protecting critical infrastructure has become a national imperative. From energy grids and transportation systems to water treatment facilities…

Gary MiliefskyGary Miliefsky
April 15, 2025
POPULAR

MITRE CVE Program in Jeopardy

As a former advisory board member to the CVE/OVAL initiatives, I’m sounding the alarm: MITRE has confirmed that funding for the CVE and CWE programs will expire on April 16,…

The True Cost of Cybercrime: Why Global Damages Could Reach $1.2 – $1.5 Trillion by End of Year 2025

Introduction: The Escalating Economic Threat of Cybercrime Cybercrime is no longer just an IT problem—it has evolved into a global economic crisis, affecting corporations, governments, and individuals alike. With increasing…

High Speed Smishing: The Psychology Behind Toll Road Scams

Ping! A sudden message appears: “Please pay for Toll Road usage on [insert random day here].” Instantly, you find yourself wondering, Where did I go that day? Did I forget…

Event Horizon: Witnessing The Birth of The AI Singularity and the Faith of the Machine

We will see the AI Singularity very soon.   How can we prepare for it? On the heels of publishing my latest book The AI Singularity: When Machines Dream of Dominion,…

Start PII Leak Detection and Data Flow Mapping Where It Matters Most: In the Code

Quick link: Learn more about how HoundDog.ai is transforming AppSec and data security at HoundDog.ai. In 2023, 92% of data breaches involved Personally Identifiable Information (PII)—a staggering and growing trend…

Sacumen Advances to the Front Line of Thought Leadership: Accelerates Cybersecurity Integration with Innovative Program

Cyber Defense Magazine Thought Leadership Interview with Nitesh Sinha, Founder and CEO of Sacumen and Praneeth Kudithipudi EVP Sales of Sacumen By Yan Ross, CDM Editor-in-Chief Editor’s Note: Cyber Defense…

The MDR That Sees It All

Unmonitored infrastructure is a major source of initial compromises for enterprises.  The Critical Start MDR solution counters this with endpoint coverage gap monitoring, log ingestion failure alerts, and hidden asset…

Massive Data Breach at National Public Data Exposes 2.7 Billion Records

In a major cybersecurity incident, National Public Data, a company that specializes in collecting and aggregating public records, has suffered a massive data breach that exposed 2.7 billion records. The…

TOP 100 IN CYBERSECURITY

13th Anniversary Global InfoSec Awards for 2025 closing soon for late entry packages! Winners Announced during RSAC 2025...

X