Call us Toll Free (USA): 1-833-844-9468     International: +1-603-280-4451 M-F 8am to 6pm EST

CDM, the world's top cybersecurity magazine is celebrating 13 years anniversary.

Read, listen, learn, watch, or write for us and be a part of the global cyber security community.

AT&T Breach 2024: Customer Data Exposed in Massive Cyber Attack

In a shocking breach of customer privacy, AT&T said in April 2024 that almost all of the data of its cell customers had been stolen. Records of most of AT&T’s…

Elena ThomasElena Thomas
SafeAeon
January 8, 2025

Download Cyber Defense Magazine January Edition
for 2025

Published monthly by Cyber Defense Magazine, this resource shares a wealth of information to help you stay one step ahead of the next cyber threat.

The Fundamental Components to Achieving Shift-Left Success

“Shift-left” is a familiar concept to CISOs and security practitioners across the globe. A term coined to promote the integration of security practices earlier in the software development lifecycle (SDLC)…

Scott GerlachScott Gerlach
StackHawk

The Role of AI in Evolving Cybersecurity Attacks

In the ever-expanding digital landscape, cybersecurity remains a critical concern for individuals, businesses, and governments alike. As technology advances, so do the tactics of cybercriminals. One of the most significant…

Will PooleWill Poole
CYFOR

A Guide for SMB Defense Contractors to Achieve CMMC Compliance

The Department of Defense (DoD) created the Cybersecurity Maturity Model Certification (CMMC) program to defend the vast attack surface of the Defense Industrial Base (DIB). CMMC is expected to become law by…

Seth SteinmanSeth Steinman
PreVeil

Navigating the Security Risks and Efficiency Gains of GenAI in Healthcare

SaaS technology and artificial intelligence (AI) are revolutionizing patient care, drug development, and health and wellness practices. Today, AI processes massive datasets of biological and chemical information to identify potential…

Lior YaariLior Yaari
Grip Security

Fight Fire with Fire: 3 Strategies to Defeat Deepfakes

Generative AI deepfakes represent another skirmish in the ongoing clash between two forces that never stop innovating I was there when AI and machine learning entered the battlefield. I started…

Hal LonasHal Lonas
Trulioo

The Common Goods and Shared Threats of the Software Supply Chain

Perhaps the defining quality of the software supply chain is complexity. Amid the countless lines of code that the modern world runs on there is potentially infinite scope for mistakes,…

Frank CatucciFrank Catucci
Invicti
SPOTLIGHT

Innovator Spotlight: Fortra

by Dan K. Anderson CEO, CISO, and vCISO As cyber threats grow more sophisticated and frequent, organizations face immense pressure to simplify their security stacks and improve operational efficiency. According…

Dan K. AndersonDan K. Anderson
December 17, 2024
POPULAR

Sacumen Advances to the Front Line of Thought Leadership: Accelerates Cybersecurity Integration with Innovative Program

Cyber Defense Magazine Thought Leadership Interview with Nitesh Sinha, Founder and CEO of Sacumen and Praneeth Kudithipudi EVP Sales of Sacumen By Yan Ross, CDM Editor-in-Chief Editor’s Note: Cyber Defense…

The MDR That Sees It All

Unmonitored infrastructure is a major source of initial compromises for enterprises.  The Critical Start MDR solution counters this with endpoint coverage gap monitoring, log ingestion failure alerts, and hidden asset…

Massive Data Breach at National Public Data Exposes 2.7 Billion Records

In a major cybersecurity incident, National Public Data, a company that specializes in collecting and aggregating public records, has suffered a massive data breach that exposed 2.7 billion records. The…

Understanding the Dark Web: What You Need to Know

Exploring the Dark Web: Essential Insights Revealed By Elena Thomas, Digital Content Strategist, SafeAeon Inc. The internet is like a huge iceberg: there is a hidden layer below the top….

Combating Cyber-attacks with Threat-Intelligence

Navigate the threat intelligence market’s journey through the digital domain and how it integrates to provide a better solution. By Deboleena Dutta, Junior Content Writer, Research Nester In today’s digitally…

Why Do Hackers Love Cryptocurrency?

Cyber criminals and hackers love cryptocurrency because it’s off the books and is perfect for moving illegal payments and demanding ransom. Ransomware is a type of malicious software designed to…

Insights from RSA Conference 2024: Transformative Innovations in Cybersecurity

Beyond the Buzz Word AI, the Practical Groundbreaking Stuff By Samridhi Agarwal, Masters Student, CMU My first RSA Conference! Oh, what a blast it was! Attending the RSA Conference has…

The Tech Jobs That AI Will Not Disrupt

By Michael Gibbs, CEO — Go Cloud Careers Artificial intelligence is the most exciting innovation to hit the tech world in decades. It has unleashed new capabilities that promise to…

TOP 100 IN CYBERSECURITY
cyberdefensegenius - ai chatbot

13th Anniversary Global InfoSec Awards for 2025 now open for early bird packages! Winners Announced during RSAC 2025...

X