Call us Toll Free (USA): 1-833-844-9468     International: +1-603-280-4451 M-F 8am to 6pm EST

CDM, the world's top cybersecurity magazine is celebrating 12 years anniversary.

Read, listen, learn, watch, or write for us and be a part of the global cyber security community.

Cyber Threat Intelligence (CTI) for Supply Chain Monitoring

Executive summary Many companies face various risks across their supply chain, which are increasing, especially cyber threats. Studies indicate that nearly all companies have at least one supplier that has…

Shawn LovelandShawn Loveland
Resecurity
November 6, 2024

Download Cyber Defense Magazine November Edition
for 2024

Published monthly by Cyber Defense Magazine, this resource shares a wealth of information to help you stay one step ahead of the next cyber threat.

Overcoming Cybersecurity Integration Roadblocks

As a CEO working alongside cybersecurity product companies, I know that integration & the connectors are necessary evil for cyber security products companies. For companies in our industry, seamless, reliable…

Nitesh SinhaNitesh Sinha
Sacumen

Unlocking the Right Encryption

The ever-evolving landscape of data security demands constant vigilance, especially for those handling Controlled Unclassified Information (CUI). A presentation by Greg Cooper, Cybersecurity SME & Security Engineer, at the USAF…

Ben WarnerBen Warner
CRU Data Security Group

Empowering Security Through Timely Nudges: Harnessing Behavioral Science for Real-Time Interventions

Picture this: your colleague’s about to click a link that you know is dodgy. You see it happening from the corner of your eye and intervene just before it’s too…

Tim WardTim Ward
Think Cyber Security Ltd

How AI Is Transforming Cyber Risk Quantification

Cyber risks differ from other more familiar risks in life, such as the dangers of a car crash for drivers, or a natural disaster for homeowners. These are well-defined, measurable…

Jose M. SearaJose M. Seara
DeNexus

Demystifying Zero Trust

What is Zero Trust It was 2010 when term “Zero Trust” was coined by John Kindervag, a thought-leader in Cyber Security industry with a motto of “never trust, always verify”….

Ashish AroraAshish Arora
Chubb

Strategy Must Adapt

The release of iOS 16.4 has been a game-changer for mobile app developers: suddenly, teams can put full-fledged web browser capabilities into their applications. Almost any iOS mobile app can…

c/side
SPOTLIGHT

Spotlight on Onyxia

Onyxia’s Cybersecurity Management Platform delivers predictive insights and data intelligence that allow CISOs to gain a complete view of their cybersecurity program performance, achieve organizational compliance, increase security stack efficiency,…

Dan K. AndersonDan K. Anderson
Cyber Defense Magazine
November 4, 2024
POPULAR

The MDR That Sees It All

Unmonitored infrastructure is a major source of initial compromises for enterprises.  The Critical Start MDR solution counters this with endpoint coverage gap monitoring, log ingestion failure alerts, and hidden asset…

Massive Data Breach at National Public Data Exposes 2.7 Billion Records

In a major cybersecurity incident, National Public Data, a company that specializes in collecting and aggregating public records, has suffered a massive data breach that exposed 2.7 billion records. The…

Understanding the Dark Web: What You Need to Know

Exploring the Dark Web: Essential Insights Revealed By Elena Thomas, Digital Content Strategist, SafeAeon Inc. The internet is like a huge iceberg: there is a hidden layer below the top….

Combating Cyber-attacks with Threat-Intelligence

Navigate the threat intelligence market’s journey through the digital domain and how it integrates to provide a better solution. By Deboleena Dutta, Junior Content Writer, Research Nester In today’s digitally…

Why Do Hackers Love Cryptocurrency?

Cyber criminals and hackers love cryptocurrency because it’s off the books and is perfect for moving illegal payments and demanding ransom. Ransomware is a type of malicious software designed to…

Insights from RSA Conference 2024: Transformative Innovations in Cybersecurity

Beyond the Buzz Word AI, the Practical Groundbreaking Stuff By Samridhi Agarwal, Masters Student, CMU My first RSA Conference! Oh, what a blast it was! Attending the RSA Conference has…

The Tech Jobs That AI Will Not Disrupt

By Michael Gibbs, CEO — Go Cloud Careers Artificial intelligence is the most exciting innovation to hit the tech world in decades. It has unleashed new capabilities that promise to…

How to interpret the 2023 MITRE ATT&CK Evaluation results

Thorough, independent tests are a vital resource as cybersecurity leaders and their teams evaluate vendors’ abilities to guard against increasingly sophisticated threats to their organization. And perhaps no assessment is…

TOP 100 IN CYBERSECURITY
cyberdefensegenius - ai chatbot

13th Anniversary Global InfoSec Awards for 2025 now open for super early bird packages! Winners Announced during RSAC 2025...

X