Call us Toll Free (USA): 1-833-844-9468     International: +1-603-280-4451 M-F 8am to 6pm EST

CDM, the world's top cybersecurity magazine is celebrating 12 years anniversary.

Read, listen, learn, watch, or write for us and be a part of the global cyber security community.

70% of Enterprises Established SaaS Security Teams, Cloud Security Alliance Survey Finds

More than 70 percent of enterprises have prioritized SaaS security by establishing dedicated teams to secure SaaS applications, a trend identified for the first time in the fourth Annual SaaS Security…

Hananel LivnehHananel Livneh
Adaptive Shield
October 15, 2024

Download Cyber Defense Magazine October Edition
for 2024

Published monthly by Cyber Defense Magazine, this resource shares a wealth of information to help you stay one step ahead of the next cyber threat.

Transforming Security Testing With AI: Benefits and Challenges

Security testing plays a critical role in ensuring that applications are protected against vulnerabilities and attacks. In times when cyber attacks like data breaches and ransomware are rising, security testing…

Haresh KumbhaniHaresh Kumbhani
Zymr Inc

Strengthening Security

Integrated Governance, Risk, and Compliance Is Critical Business executives in all sectors place a high premium on security in the quickly changing digital landscape of today. Security is no longer…

Dasha DaviesDasha Davies
Stealth-ISS Group Inc.

RegreSSHion, Critical RCE Vulnerabilities, and When Should You Be Scared?

On July 1st, 2024, the cybersecurity community was rocked by the discovery of a critical Remote Code Execution (RCE) vulnerability in OpenSSH, aptly named regreSSHion. This revelation triggered a frenzy…

Jonathan JacobiJonathan Jacobi
Dazz

NextGen Identity Management

Federal agencies face a pivotal cybersecurity challenge: prevent unauthorized entities from accessing systems and facilities, while granting authorized federal employees and contractors access commensurate with verified need. Two factors complicate…

Dr. Sarbari GuptaDr. Sarbari Gupta
Electrosoft Services, Inc

How AI-Driven Cybersecurity Offers Both Promise and Peril for Enterprises

Artificial Intelligence (AI) is transforming multiple sectors, driving innovation and enhancing productivity and cybersecurity. The AI market is projected to rise from an estimated $86.9 billion in revenue in 2022…

Metin KortakMetin Kortak
Rhymetec

Worried about Insider Risk? Pay More Attention to Offboarding

Discussions of insider risk inevitably conjure images of disgruntled IT employees stealing sensitive data from the comfort of an air-conditioned office. However, insider risk is significantly more complex, and any…

Cristian GrossmannCristian Grossmann
Beekeeper
SPOTLIGHT

Innovator Spotlight: Cyberseconomics

In today’s rapidly evolving digital landscape, fear, uncertainty, and doubt have become the dominant emotions for many organizations grappling with cybersecurity. The constant reports of data breaches, ransomware attacks, and…

Pete GreenPete Green
Cyber Defense Magazine
October 11, 2024
POPULAR

The MDR That Sees It All

Unmonitored infrastructure is a major source of initial compromises for enterprises.  The Critical Start MDR solution counters this with endpoint coverage gap monitoring, log ingestion failure alerts, and hidden asset…

Massive Data Breach at National Public Data Exposes 2.7 Billion Records

In a major cybersecurity incident, National Public Data, a company that specializes in collecting and aggregating public records, has suffered a massive data breach that exposed 2.7 billion records. The…

Understanding the Dark Web: What You Need to Know

Exploring the Dark Web: Essential Insights Revealed By Elena Thomas, Digital Content Strategist, SafeAeon Inc. The internet is like a huge iceberg: there is a hidden layer below the top….

Combating Cyber-attacks with Threat-Intelligence

Navigate the threat intelligence market’s journey through the digital domain and how it integrates to provide a better solution. By Deboleena Dutta, Junior Content Writer, Research Nester In today’s digitally…

Why Do Hackers Love Cryptocurrency?

Cyber criminals and hackers love cryptocurrency because it’s off the books and is perfect for moving illegal payments and demanding ransom. Ransomware is a type of malicious software designed to…

Insights from RSA Conference 2024: Transformative Innovations in Cybersecurity

Beyond the Buzz Word AI, the Practical Groundbreaking Stuff By Samridhi Agarwal, Masters Student, CMU My first RSA Conference! Oh, what a blast it was! Attending the RSA Conference has…

The Tech Jobs That AI Will Not Disrupt

By Michael Gibbs, CEO — Go Cloud Careers Artificial intelligence is the most exciting innovation to hit the tech world in decades. It has unleashed new capabilities that promise to…

How to interpret the 2023 MITRE ATT&CK Evaluation results

Thorough, independent tests are a vital resource as cybersecurity leaders and their teams evaluate vendors’ abilities to guard against increasingly sophisticated threats to their organization. And perhaps no assessment is…

TOP 100 IN CYBERSECURITY
cyberdefensegenius - ai chatbot

12th Anniversary Top InfoSec Innovator & Black Unicorn Awards for 2024 remain open for late entries! Winners Announced October 31, 2024...

X