Call us Toll Free (USA): 1-833-844-9468     International: +1-603-280-4451 M-F 8am to 6pm EST

CDM, the world's top cybersecurity magazine is celebrating 13 years anniversary.

Read, listen, learn, watch, or write for us and be a part of the global cyber security community.

The Growing Cost of Non-Compliance and the Need for Security-First Solutions

Organizations across the world are facing mounting pressures to comply with a complex web of regulations. Failure to meet these requirements doesn’t just result in inconvenience or minor setbacks –…

Puneet KohliPuneet Kohli
Rocket Software
April 12, 2025

Download Cyber Defense Magazine April Edition
for 2025

Published monthly by Cyber Defense Magazine, this resource shares a wealth of information to help you stay one step ahead of the next cyber threat.

The Art of Delegation in a Digital Age: Empowering Teams, Not Just Offloading Tasks

Effective task delegation is a vital skill for any manager. Strategically transferring specific tasks to capable team members can boost efficiency, improve decision-making, and empower staff to create a healthy,…

Josh Breaker-RolfeJosh Breaker-Rolfe
Bora

Smart Meter Security: Best Practices and Emerging Regulations

Smart meters are essential to smart grids, empowering utilities and smart grid managers to provide consumers and energy providers with real-time energy consumption data, transparent billing, and demand side management….

Jose SanchezJose Sanchez
Telit Cinterion

Securing The AI Frontier: Addressing Emerging Threats In AI-Powered Software Development

AI in software development is no longer a glimpse into the future – it’s here, woven into daily workflows and it’s accelerating at a breakneck pace. According to PwC’s AI Predictions…

Matt TesauroMatt Tesauro
DefectDojo Inc.

The Role of AI In Cybersecurity: Enhancing Defense And Adapting To Threats

The cybersecurity landscape today feels like a constant game of cat and mouse. Every time we think we’ve outpaced the attackers; they find new ways to exploit vulnerabilities. Enter artificial…

Randy HallRandy Hall
Securafy Inc.

Can AI Be Your Trusted Partner in Securing Your Extended Business Ecosystem?

In today’s interconnected business world, organizations rely on a vast web of third-party vendors, suppliers, and partners. While these relationships are essential for growth and innovation, they also introduce significant…

Phani DasariPhani Dasari
HGS

Overcoming The Skills Shortage in Cybersecurity Through A ‘Trusted’ Approach.

The scale of cyberattacks seen today is both unprecedented and harrowing. Crucial sectors including healthcare, finance, and education have found themselves increasingly under attack, with hackers leaving behind a trail…

Thorsten StremlauThorsten Stremlau
NVIDIA
SPOTLIGHT

Publishers Spotlight: Flashpoint

In 2024, a new hybrid cold war is redefining the threat landscape. Cyber, physical, and geopolitical risks are converging, with nation-states, ransomware groups, and insider threats exploiting vulnerabilities to disrupt…

Gary MiliefskyGary Miliefsky
February 13, 2025
POPULAR

The True Cost of Cybercrime: Why Global Damages Could Reach $1.2 – $1.5 Trillion by End of Year 2025

Introduction: The Escalating Economic Threat of Cybercrime Cybercrime is no longer just an IT problem—it has evolved into a global economic crisis, affecting corporations, governments, and individuals alike. With increasing…

High Speed Smishing: The Psychology Behind Toll Road Scams

Ping! A sudden message appears: “Please pay for Toll Road usage on [insert random day here].” Instantly, you find yourself wondering, Where did I go that day? Did I forget…

Event Horizon: Witnessing The Birth of The AI Singularity and the Faith of the Machine

We will see the AI Singularity very soon.   How can we prepare for it? On the heels of publishing my latest book The AI Singularity: When Machines Dream of Dominion,…

Start PII Leak Detection and Data Flow Mapping Where It Matters Most: In the Code

Quick link: Learn more about how HoundDog.ai is transforming AppSec and data security at HoundDog.ai. In 2023, 92% of data breaches involved Personally Identifiable Information (PII)—a staggering and growing trend…

Sacumen Advances to the Front Line of Thought Leadership: Accelerates Cybersecurity Integration with Innovative Program

Cyber Defense Magazine Thought Leadership Interview with Nitesh Sinha, Founder and CEO of Sacumen and Praneeth Kudithipudi EVP Sales of Sacumen By Yan Ross, CDM Editor-in-Chief Editor’s Note: Cyber Defense…

The MDR That Sees It All

Unmonitored infrastructure is a major source of initial compromises for enterprises.  The Critical Start MDR solution counters this with endpoint coverage gap monitoring, log ingestion failure alerts, and hidden asset…

Massive Data Breach at National Public Data Exposes 2.7 Billion Records

In a major cybersecurity incident, National Public Data, a company that specializes in collecting and aggregating public records, has suffered a massive data breach that exposed 2.7 billion records. The…

Understanding the Dark Web: What You Need to Know

Exploring the Dark Web: Essential Insights Revealed By Elena Thomas, Digital Content Strategist, SafeAeon Inc. The internet is like a huge iceberg: there is a hidden layer below the top….

TOP 100 IN CYBERSECURITY

13th Anniversary Global InfoSec Awards for 2025 late entry closing soon! Winners Announced during RSAC 2025...

X