Call us Toll Free (USA): 1-833-844-9468     International: +1-603-280-4451 M-F 8am to 6pm EST

CDM, the world's top cybersecurity magazine is celebrating 13 years anniversary.

Read, listen, learn, watch, or write for us and be a part of the global cyber security community.

CMMC 2.0 Final Rule Released – Get Prepared Now!

In a significant step to secure the defense industrial base (DIB), the Department of Defense (DoD) has officially released the long-anticipated Cybersecurity Maturity Model Certification (CMMC) Final Rule, which was…

Joe ColemanJoe Coleman
Bluestreak Compliance
August 27, 2025

Download Cyber Defense Magazine August Edition
for 2025

Published monthly by Cyber Defense Magazine, this resource shares a wealth of information to help you stay one step ahead of the next cyber threat.

Black Hat Ignites Under Vegas Lights

Driving through the quiet, endless beauty of the Nevada desert, I let the raspy voice of Jim Morrison carry me forward. “The End” played as the final song before I…

Angela ApolinarAngela Apolinar

Is the Cyber Resilience Act the Biggest Thing to Hit Compliance Since GDPR?

There’s a lot of noise around compliance. New regulations seem to pop up every year, each promising to fix the ever-growing list of security problems that come with the digital…

Dotan NahumDotan Nahum
Check Point Software Technologies

Why Enterprises Need Preemptive Cybersecurity to Combat Modern Phishing

Phishing isn’t what it used to be. It’s no longer fake emails with bad grammar and sketchy links. With AI, modern phishing attacks have become slicker, more convincing, and dangerously…

Cyber Security Simulation Training Mistakes That CISOs Must Avoid

Your team’s ability to identify phishing attempts in their inboxes has the potential to make or break your entire security posture, which is why having an effective training program in…

Cybersecurity Wake-Up Call: Why All Businesses Must Prepare for the Inevitable Attack

Cybersecurity has emerged as a critical and ongoing battle against a dynamic and pervasive global threat. The landscape is evolving rapidly, with adversaries increasingly gaining ground in this ongoing struggle….

Shena Seneca TharnishShena Seneca Tharnish
Comcast Business

Digital Nomads and Cybersecurity: Navigating the New Frontier of Work

We live in an era where your next big idea could come from an employee working out of a cafe in Tokyo or on the beach in Bali. The digital…

Hiren HasmukhHiren Hasmukh
Teqtivity
SPOTLIGHT

Innovator Spotlight: Backslash Security

Securing the Future of AI Powered Coding:  Where Speed Meets Risk The rise of AI powered coding tools like Cursor and Windsurf have kicked off what many are calling the “vibe…

Angela ApolinarAngela Apolinar
August 19, 2025
POPULAR

Publisher’s Spotlight: NAKIVO Backup & Replication v11

A Powerful, All-in-One Solution for Cyber-Resilient Backup and Recovery In an era where ransomware, cloud complexity, and regulatory pressures are reshaping data protection priorities, NAKIVO Backup & Replication v11 provides…

Countdown to Digital Armageddon: U.S. and Russia on the Brink

by Gary Miliefsky, Publisher, Cyber Defense Magazine In the shadowy corners of the internet, war is already underway. It doesn’t look like the battles of old – no tanks, no…

From Instinct to Impact: How CYE is Redefining Cybersecurity with Data Science and Business Precision

A Conversation with Ira Winkler on Turning Cyber Risk into Measurable Business Value Through the Power of Hyver In a world where cybersecurity is no longer a back-office concern but…

AI Readiness Starts With Identity: Why Gathid Is Leading the Charge

by Gary  Miliefsky, Publisher As artificial intelligence reshapes the cybersecurity landscape, one truth has become abundantly clear: identity and access governance must evolve in lockstep. Enterprises rushing to integrate AI across…

Innovator Spotlight: LatticaAI

Lattica’s Mission: Making Private AI a Reality with the Power of Fully Homomorphic Encryption In the buzz-heavy world of AI and cybersecurity, it’s not every day a company steps out…

MITRE CVE Program in Jeopardy

As a former advisory board member to the CVE/OVAL initiatives, I’m sounding the alarm: MITRE has confirmed that funding for the CVE and CWE programs will expire on April 16,…

The True Cost of Cybercrime: Why Global Damages Could Reach $1.2 – $1.5 Trillion by End of Year 2025

Introduction: The Escalating Economic Threat of Cybercrime Cybercrime is no longer just an IT problem—it has evolved into a global economic crisis, affecting corporations, governments, and individuals alike. With increasing…

High Speed Smishing: The Psychology Behind Toll Road Scams

Ping! A sudden message appears: “Please pay for Toll Road usage on [insert random day here].” Instantly, you find yourself wondering, Where did I go that day? Did I forget…

TOP 100 IN CYBERSECURITY

Top Global CISOs, Top InfoSec Innovators and Black Unicorn Awards Program for 2025 Now Open...

X

Stay Informed. Stay Secure. Read the Latest Cyber Defense eMag

X