Call us Toll Free (USA): 1-833-844-9468     International: +1-603-280-4451 M-F 8am to 6pm EST

CDM, the world's top cybersecurity magazine is celebrating 13 years anniversary.

Read, listen, learn, watch, or write for us and be a part of the global cyber security community.

Now Is Not the Time to Cut Back on Security Teams

Generative artificial intelligence (AI) is revolutionising the way businesses operate. The widespread adoption and integration of models, such as OpenAI’s ChatGPT and Google’s Gemini, into everyday organisational processes has resulted…

Dr Nick NewDr Nick New
Optalysys
April 25, 2025

Download Cyber Defense Magazine April Edition
for 2025

Published monthly by Cyber Defense Magazine, this resource shares a wealth of information to help you stay one step ahead of the next cyber threat.

The Story of Jericho Security

Redefining Cybersecurity for the AI Era With the launch of ChatGPT, everything changed – overnight, AI became democratized. But while everyday users turned to AI for grocery lists and grammar…

Grace MuchtarGrace Muchtar
Jericho Security

How CISOs Can Master Operational Control Assurance — And Why It Matters

Chief Information Security Officers are facing rising pressure to ensure robust security and compliance across globally distributed environments. Managing multiple security tools and platforms while avoiding inconsistencies and gaps in…

Dale HoakDale Hoak
RegScale

One Vendor Delivers 100% Protection And 100% Detection Visibility in MITRE ATT&CK Evaluation

Priority number one for cybersecurity leaders across small-to-medium enterprises (SMEs) and managed service providers (MSPs) is to ensure IT environments are up and running. To proactively minimize the risk of…

George Tubin & Michael NewellGeorge Tubin & Michael Newell
Cynet

The Illusion of Truth: The Risks and Responses to Deepfake Technology

Abstract In the age of information, where the line between reality and fiction is increasingly blurred, deepfake technology has emerged as a powerful tool with both immense potential and significant…

Rohit NirantarRohit Nirantar

The Internet of Things Design Challenges

Developing an engineering project is a challenge by itself. In the practice, dealing with some product or service is very requiring and it can take a couple of phases from…

Milica D. DjekicMilica D. Djekic

Unlocking Tension Between Security and Networking Teams With SASE: A Leadership Perspective on Balancing Performance and Safety

The demand for highly performant networks has risen exponentially as organizations seek to empower employees with fast, anywhere access to key applications. At the same time, the threat environment continues…

Stephen AmstutzStephen Amstutz
Xalient
SPOTLIGHT

Innovator Spotlight: LatticaAI

Lattica’s Mission: Making Private AI a Reality with the Power of Fully Homomorphic Encryption In the buzz-heavy world of AI and cybersecurity, it’s not every day a company steps out…

Pete GreenPete Green
April 25, 2025
POPULAR

Innovator Spotlight: LatticaAI

Lattica’s Mission: Making Private AI a Reality with the Power of Fully Homomorphic Encryption In the buzz-heavy world of AI and cybersecurity, it’s not every day a company steps out…

MITRE CVE Program in Jeopardy

As a former advisory board member to the CVE/OVAL initiatives, I’m sounding the alarm: MITRE has confirmed that funding for the CVE and CWE programs will expire on April 16,…

The True Cost of Cybercrime: Why Global Damages Could Reach $1.2 – $1.5 Trillion by End of Year 2025

Introduction: The Escalating Economic Threat of Cybercrime Cybercrime is no longer just an IT problem—it has evolved into a global economic crisis, affecting corporations, governments, and individuals alike. With increasing…

High Speed Smishing: The Psychology Behind Toll Road Scams

Ping! A sudden message appears: “Please pay for Toll Road usage on [insert random day here].” Instantly, you find yourself wondering, Where did I go that day? Did I forget…

Event Horizon: Witnessing The Birth of The AI Singularity and the Faith of the Machine

We will see the AI Singularity very soon.   How can we prepare for it? On the heels of publishing my latest book The AI Singularity: When Machines Dream of Dominion,…

Start PII Leak Detection and Data Flow Mapping Where It Matters Most: In the Code

Quick link: Learn more about how HoundDog.ai is transforming AppSec and data security at HoundDog.ai. In 2023, 92% of data breaches involved Personally Identifiable Information (PII)—a staggering and growing trend…

Sacumen Advances to the Front Line of Thought Leadership: Accelerates Cybersecurity Integration with Innovative Program

Cyber Defense Magazine Thought Leadership Interview with Nitesh Sinha, Founder and CEO of Sacumen and Praneeth Kudithipudi EVP Sales of Sacumen By Yan Ross, CDM Editor-in-Chief Editor’s Note: Cyber Defense…

The MDR That Sees It All

Unmonitored infrastructure is a major source of initial compromises for enterprises.  The Critical Start MDR solution counters this with endpoint coverage gap monitoring, log ingestion failure alerts, and hidden asset…

TOP 100 IN CYBERSECURITY

13th Anniversary Global InfoSec Awards for 2025 is closed! Winners Announced during RSAC 2025...

X