Call us Toll Free (USA): 1-833-844-9468     International: +1-603-280-4451 M-F 8am to 6pm EST

CDM, the world's top cybersecurity magazine is celebrating 13 years anniversary.

Read, listen, learn, watch, or write for us and be a part of the global cyber security community.

Can Standards Deal a Deathly Blow Against Deepfakes?

Recent advances in generative artificial intelligence (AI) are making it increasingly difficult to know the difference between what is real and what is not. Computer-generated clips that are designed to…

Alessandra SalaAlessandra Sala
Shutterstock
March 22, 2025

Download Cyber Defense Magazine March Edition
for 2025

Published monthly by Cyber Defense Magazine, this resource shares a wealth of information to help you stay one step ahead of the next cyber threat.

AI-Powered Testing: Innovation, Risks, and What Comes Next

Artificial intelligence (AI) is transforming software testing, driving unparalleled speed, accuracy, and coverage in comparison to traditional, manual methods. However, all good things come at a cost. As organizations integrate…

Jason KichenJason Kichen
Tricentis

AI-Powered Cyber Attacks and Data Privacy in The Age of Big Data

The fast transformation and evolution of artificial intelligence (AI) significantly changed the general norm and operational process of industries. This drastically transformed different sectors of industries related to finance, healthcare…

Balasubramani MurugesanBalasubramani Murugesan
Digit7 LLC

AI In Software Development: Balancing Innovation and Security in An Era of Lowered Barriers

AI is reshaping software development. The advent of sophisticated AI models such as DeepSeek and Ghost GPT has democratized access to powerful AI-assisted coding tools, pushing the boundaries of innovation…

Michael BirchMichael Birch
Security Journey

AI’s Impact on Enterprise Security and How CISOs Should Prepare

As Artificial Intelligence starts touching each aspect of every enterprise, let us find out the implications of AI on overall enterprise security. Learn how CISOs can prepare for the future…

Aparna AchantaAparna Achanta
IBM Federal Consulting

How can Organizations Secure Low-Code No-Code Development

Applications developed by citizen developers are on the rise. Low-code and no-code (LCNC) platforms are reshaping the development ecosystem. These tools are broadening horizons and enabling citizen developers to create…

Aparna Achanta
IBM Federal Consulting

AI Addressing New Need to Secure Data from The Inside Out

Today’s traditional perimeter-based cybersecurity measures are increasingly inadequate due to threats that arise from within an organization. Whether born of malice or mistake, it’s clear that insider threats are only…

Rob SimsRob Sims
Alchemi Data Management
SPOTLIGHT

Publishers Spotlight: Flashpoint

In 2024, a new hybrid cold war is redefining the threat landscape. Cyber, physical, and geopolitical risks are converging, with nation-states, ransomware groups, and insider threats exploiting vulnerabilities to disrupt…

Gary MiliefskyGary Miliefsky
February 13, 2025
POPULAR

The True Cost of Cybercrime: Why Global Damages Could Reach $1.2 – $1.5 Trillion by End of Year 2025

Introduction: The Escalating Economic Threat of Cybercrime Cybercrime is no longer just an IT problem—it has evolved into a global economic crisis, affecting corporations, governments, and individuals alike. With increasing…

High Speed Smishing: The Psychology Behind Toll Road Scams

Ping! A sudden message appears: “Please pay for Toll Road usage on [insert random day here].” Instantly, you find yourself wondering, Where did I go that day? Did I forget…

Event Horizon: Witnessing The Birth of The AI Singularity and the Faith of the Machine

We will see the AI Singularity very soon.   How can we prepare for it? On the heels of publishing my latest book The AI Singularity: When Machines Dream of Dominion,…

Start PII Leak Detection and Data Flow Mapping Where It Matters Most: In the Code

Quick link: Learn more about how HoundDog.ai is transforming AppSec and data security at HoundDog.ai. In 2023, 92% of data breaches involved Personally Identifiable Information (PII)—a staggering and growing trend…

Sacumen Advances to the Front Line of Thought Leadership: Accelerates Cybersecurity Integration with Innovative Program

Cyber Defense Magazine Thought Leadership Interview with Nitesh Sinha, Founder and CEO of Sacumen and Praneeth Kudithipudi EVP Sales of Sacumen By Yan Ross, CDM Editor-in-Chief Editor’s Note: Cyber Defense…

The MDR That Sees It All

Unmonitored infrastructure is a major source of initial compromises for enterprises.  The Critical Start MDR solution counters this with endpoint coverage gap monitoring, log ingestion failure alerts, and hidden asset…

Massive Data Breach at National Public Data Exposes 2.7 Billion Records

In a major cybersecurity incident, National Public Data, a company that specializes in collecting and aggregating public records, has suffered a massive data breach that exposed 2.7 billion records. The…

Understanding the Dark Web: What You Need to Know

Exploring the Dark Web: Essential Insights Revealed By Elena Thomas, Digital Content Strategist, SafeAeon Inc. The internet is like a huge iceberg: there is a hidden layer below the top….

TOP 100 IN CYBERSECURITY
cyberdefensegenius - ai chatbot

13th Anniversary Global InfoSec Awards for 2025 now open for early bird packages! Winners Announced during RSAC 2025...

X