Call us Toll Free (USA): 1-833-844-9468     International: +1-603-280-4451 M-F 8am to 6pm EST

CDM, the world's top cybersecurity magazine is celebrating 13 years anniversary.

Read, listen, learn, watch, or write for us and be a part of the global cyber security community.

On Constant Community Improvements

The theme of this year’s RSAC is “Many Voices. One Community.” While our field can rightly claim “many voices”, portraying it as a “community” is a bit of a stretch….

Maxime Lamothe-BrassardMaxime Lamothe-Brassard
LimaCharlie
June 12, 2025

Download Cyber Defense Magazine June Edition
for 2025

Published monthly by Cyber Defense Magazine, this resource shares a wealth of information to help you stay one step ahead of the next cyber threat.

One Piece of the Puzzle: How a Single Digital Identifier Can Unravel Your Entire Online Life

In an era where our lives are increasingly lived online, our digital identities are sprawling networks of accounts and personal data. A simple email address or phone number—often considered a…

Raph MarchandRaph Marchand
ChatOdyssey

Modernizing Critical Infrastructure Security to Meet Today’s Threats

Ransomware attacks are no longer just a cybersecurity concern – they are a direct threat to national security. A recent study found that among organizations hit by ransomware in the past 12…

John KindervagJohn Kindervag
Illumio

Scaling Smart: Federal Leaders Prioritize AI Security and Resilience

The biggest threat to artificial intelligence (AI) in government isn’t hype – it’s inertia. As Federal agencies explore opportunities to integrate AI into mission operations and citizen service functions (alongside…

MeriTalk StaffMeriTalk Staff

Implementing Effective AI Guardrails: A Cybersecurity Framework

As organizations race to implement AI solutions, security leaders face the challenge of enabling progress while protecting sensitive data. Grand Canyon Education (GCE), which serves 22 university partners, recently confronted this…

Sourabh SatishSourabh Satish
Pangea

How to Use Risk Management to Strengthen Business Cybersecurity

Cybersecurity is a massive point of emphasis for most businesses in the modern age. You must work diligently to protect your company from hackers, scams, phishing emails, and data loss….

Taylor McKnightTaylor McKnight
CLDigital

How To Strengthen the Security of Your Symfony-Based Solution

Like all web-based solutions, applications built with Symfony are exposed to various cyber threats, and you should be ready to address them to make your website or app secure. After…

Roman DavydovRoman Davydov
Itransition
SPOTLIGHT

Innovator Spotlight: The Human Factor: How Lookout is Redefining Mobile Threat Protection

The smartphone in your pocket is now the most dangerous weapon in a cybercriminal’s arsenal. While security teams fortify traditional defenses, attackers have discovered a more vulnerable target: the human…

Pete GreenPete Green
June 5, 2025
POPULAR

Countdown to Digital Armageddon: U.S. and Russia on the Brink

by Gary Miliefsky, Publisher, Cyber Defense Magazine In the shadowy corners of the internet, war is already underway. It doesn’t look like the battles of old – no tanks, no…

From Instinct to Impact: How CYE is Redefining Cybersecurity with Data Science and Business Precision

A Conversation with Ira Winkler on Turning Cyber Risk into Measurable Business Value Through the Power of Hyver In a world where cybersecurity is no longer a back-office concern but…

AI Readiness Starts With Identity: Why Gathid Is Leading the Charge

by Gary  Miliefsky, Publisher As artificial intelligence reshapes the cybersecurity landscape, one truth has become abundantly clear: identity and access governance must evolve in lockstep. Enterprises rushing to integrate AI across…

Innovator Spotlight: LatticaAI

Lattica’s Mission: Making Private AI a Reality with the Power of Fully Homomorphic Encryption In the buzz-heavy world of AI and cybersecurity, it’s not every day a company steps out…

MITRE CVE Program in Jeopardy

As a former advisory board member to the CVE/OVAL initiatives, I’m sounding the alarm: MITRE has confirmed that funding for the CVE and CWE programs will expire on April 16,…

The True Cost of Cybercrime: Why Global Damages Could Reach $1.2 – $1.5 Trillion by End of Year 2025

Introduction: The Escalating Economic Threat of Cybercrime Cybercrime is no longer just an IT problem—it has evolved into a global economic crisis, affecting corporations, governments, and individuals alike. With increasing…

High Speed Smishing: The Psychology Behind Toll Road Scams

Ping! A sudden message appears: “Please pay for Toll Road usage on [insert random day here].” Instantly, you find yourself wondering, Where did I go that day? Did I forget…

Event Horizon: Witnessing The Birth of The AI Singularity and the Faith of the Machine

We will see the AI Singularity very soon.   How can we prepare for it? On the heels of publishing my latest book The AI Singularity: When Machines Dream of Dominion,…

TOP 100 IN CYBERSECURITY

Top Global CISOs, Top InfoSec Innovators and Black Unicorn Awards Program for 2025 Now Open...

X

Stay Informed. Stay Secure. Read the Latest Cyber Defense eMag

X