Call us Toll Free (USA): 1-833-844-9468     International: +1-603-280-4451 M-F 8am to 6pm EST

CDM, the world's top cybersecurity magazine is celebrating 12 years anniversary.

Read, listen, learn, watch, or write for us and be a part of the global cyber security community.

Securing the OT Stage: NIS2, CRA, and IEC62443 Take Center Spotlight

In the dynamic landscape of Operational Technology (OT), robust cybersecurity measures are paramount. As the digital transformation accelerates, protecting critical infrastructure becomes more challenging. Fortunately, three key standards—NIS2, CRA, and…

Vinny SagarVinny Sagar
swIDch
December 23, 2024

Download Cyber Defense Magazine December Edition
for 2024

Published monthly by Cyber Defense Magazine, this resource shares a wealth of information to help you stay one step ahead of the next cyber threat.

The Urgent Need for Data Minimization Standards

A central principle in many data protection laws around the globe is data minimization. But we are currently facing a serious issue: we don’t have legal clarity on what exactly…

Kathrin Gardhouse & Patricia ThaineKathrin Gardhouse & Patricia Th...
Private AI

Four Ways to Harden Your Code Against Security Vulnerabilities and Weaknesses

The specter of security vulnerabilities is a constant concern in today’s digital landscape. They’re the hidden pitfalls that can undermine even the most meticulously crafted code. But what if you…

Olga KundzichOlga Kundzich
Moderne

Ditch The Cloud Security Labels to Nail Detection and Response

Today’s cloud security categories don’t do practitioners any favors when it comes to identifying the key requirements for detection and response in the cloud. This is because various detection and…

Jimmy MestaJimmy Mesta
RAD Security

Is There a DDoS Attack Ceiling?

Today, it’s rare for a month to pass without reports of new distributed denial-of-service (DDoS) attacks. Lately, geopolitical instability and hacktivist groups (e.g., Anonymous Sudan and NoName057(16)) have driven attacks, and these types of attacks…

Gary SockriderGary Sockrider
NETSCOUT

Cybersecurity At the Crossroads: The Role Of Private Companies In Safeguarding U.S. Critical Infrastructure

In an era where we are completely reliant on digital connectivity, the security of our critical infrastructure is paramount. CISA defines 16 sectors of US critical infrastructure; each unique and yet…

Chris StoreyChris Storey
Qriar Cybersecurity

Protect SAP Supply Chains by Preventing Cyber Attacks

Highly advanced and extremely dangerous cyberattacks are targeting SAP (from the company originally called “System Analysis Program” Development) software supply chains with an alarming increase in frequency. By taking advantage…

Christoph NagyChristoph Nagy
SecurityBridge
SPOTLIGHT

Innovator Spotlight: Fortra

by Dan K. Anderson CEO, CISO, and vCISO As cyber threats grow more sophisticated and frequent, organizations face immense pressure to simplify their security stacks and improve operational efficiency. According…

Dan K. AndersonDan K. Anderson
December 17, 2024
POPULAR

Sacumen Advances to the Front Line of Thought Leadership: Accelerates Cybersecurity Integration with Innovative Program

Cyber Defense Magazine Thought Leadership Interview with Nitesh Sinha, Founder and CEO of Sacumen and Praneeth Kudithipudi EVP Sales of Sacumen By Yan Ross, CDM Editor-in-Chief Editor’s Note: Cyber Defense…

The MDR That Sees It All

Unmonitored infrastructure is a major source of initial compromises for enterprises.  The Critical Start MDR solution counters this with endpoint coverage gap monitoring, log ingestion failure alerts, and hidden asset…

Massive Data Breach at National Public Data Exposes 2.7 Billion Records

In a major cybersecurity incident, National Public Data, a company that specializes in collecting and aggregating public records, has suffered a massive data breach that exposed 2.7 billion records. The…

Understanding the Dark Web: What You Need to Know

Exploring the Dark Web: Essential Insights Revealed By Elena Thomas, Digital Content Strategist, SafeAeon Inc. The internet is like a huge iceberg: there is a hidden layer below the top….

Combating Cyber-attacks with Threat-Intelligence

Navigate the threat intelligence market’s journey through the digital domain and how it integrates to provide a better solution. By Deboleena Dutta, Junior Content Writer, Research Nester In today’s digitally…

Why Do Hackers Love Cryptocurrency?

Cyber criminals and hackers love cryptocurrency because it’s off the books and is perfect for moving illegal payments and demanding ransom. Ransomware is a type of malicious software designed to…

Insights from RSA Conference 2024: Transformative Innovations in Cybersecurity

Beyond the Buzz Word AI, the Practical Groundbreaking Stuff By Samridhi Agarwal, Masters Student, CMU My first RSA Conference! Oh, what a blast it was! Attending the RSA Conference has…

The Tech Jobs That AI Will Not Disrupt

By Michael Gibbs, CEO — Go Cloud Careers Artificial intelligence is the most exciting innovation to hit the tech world in decades. It has unleashed new capabilities that promise to…

TOP 100 IN CYBERSECURITY
cyberdefensegenius - ai chatbot

13th Anniversary Global InfoSec Awards for 2025 now open for early bird packages! Winners Announced during RSAC 2025...

X