Call us Toll Free (USA): 1-833-844-9468     International: +1-603-280-4451 M-F 8am to 6pm EST

CDM, the world's top cybersecurity magazine is celebrating 14 years anniversary.

Read, listen, learn, watch, or write for us and be a part of the global cyber security community.

Getting Socs Back On The Front Foot With Paranoid Posture Management

Security operations (SecOps) teams are increasingly on the back foot. The mean time to identify and contain a breach today stands at 241 days, according to IBM. That’s over eight months…

Merlin GillespieMerlin Gillespie
Cybanetix
April 4, 2026

Download Cyber Defense Magazine RSAC Conference 2026 Special Edition

Published monthly by Cyber Defense Magazine, this resource shares a wealth of information to help you stay one step ahead of the next cyber threat.

5 Best Practices For Managing Remote Access To Industrial Equipment

There has never been a greater need for secure remote connections to production machinery. Industrial settings are getting progressively more automated and the ability to issue commands and troubleshoot without…

Zac AmosZac Amos
ReHack Magazine

Are Network Troubleshooting Tools A Hidden Cybersecurity Risk?

Network troubleshooting tools such as ping, extended ping, and traceroute are fundamental to modern IP networking. They are taught early in CCNA-level training and relied upon daily by engineers to…

Azizullah SaleemAzizullah Saleem

The Phantasmagoric Perimeter: Why Your Zero Trust Architecture Is A Mere Mirage

For the better part of a decade, the cybersecurity fraternity has sought refuge within a singular, dogmatic axiom: Never Trust, Always Verify. The emergence of Zero Trust Architecture was heralded…

Sunil GentyalaSunil Gentyala
HCLTech

The Availability Imperative

Introduction The world of Operational Technology (OT) demands certainty. The systems that run our factories, power grids, and water treatment plants simply cannot tolerate the unpredictable nature of standard IT…

Dmitry SevostiyanovDmitry Sevostiyanov
The Boeing Company

RSAC Conference Executive Insights: Part II: Email Security Has Decimated Business Communications

by Gary S. Miliefsky, Publisher, Cyber Defense Magazine Email was once the most reliable business tool in the world. You sent a message. It arrived. Business moved forward. Today, that…

Gary MiliefskyGary Miliefsky

Why Privileged & Secret Management Programs Fail In Real Enterprises

Most of the enterprises believe that their privileged access management (PAM) or Secret Management program is mature. They have tools, dashboards, policies and audits. And yet, a breach occurs with…

Anupam NandanAnupam Nandan
SPOTLIGHT

Innovator Spotlight: DataBahn

Making SIEM Worth Loving: Why CISOs Need an Independent Security Data Pipeline The CISO–SIEM Love-Hate Relationship Security operations rarely start with love stories. Ask almost any CISO how they feel…

Pete GreenPete Green
March 11, 2026
POPULAR

Halting Hackers for the Holidays: Christmas 2025 & New Year 2026 Edition

How to Outsmart the Cyber Crooks and Festive Fraudsters in an AI-Driven Threat Landscape by Gary S. Miliefsky Publisher, Cyber Defense Magazine CEO, Cyber Defense Media Group The holidays are…

AI vs AI: The Future of Cybersecurity Is Machine vs. Machine. Is the human factor still relevant?

How Artificial Intelligence is transforming both cyber defense and cybercrime by Venkatesh Apsingekar, Senior Engineering Manager – Illumio I recently watched Terminator 2 with my 9-year-old son. Since It was…

Publisher’s Spotlight: NAKIVO Backup & Replication v11

A Powerful, All-in-One Solution for Cyber-Resilient Backup and Recovery In an era where ransomware, cloud complexity, and regulatory pressures are reshaping data protection priorities, NAKIVO Backup & Replication v11 provides…

Countdown to Digital Armageddon: U.S. and Russia on the Brink

by Gary Miliefsky, Publisher, Cyber Defense Magazine In the shadowy corners of the internet, war is already underway. It doesn’t look like the battles of old – no tanks, no…

From Instinct to Impact: How CYE is Redefining Cybersecurity with Data Science and Business Precision

A Conversation with Ira Winkler on Turning Cyber Risk into Measurable Business Value Through the Power of Hyver In a world where cybersecurity is no longer a back-office concern but…

AI Readiness Starts With Identity: Why Gathid Is Leading the Charge

by Gary  Miliefsky, Publisher As artificial intelligence reshapes the cybersecurity landscape, one truth has become abundantly clear: identity and access governance must evolve in lockstep. Enterprises rushing to integrate AI across…

Innovator Spotlight: LatticaAI

Lattica’s Mission: Making Private AI a Reality with the Power of Fully Homomorphic Encryption In the buzz-heavy world of AI and cybersecurity, it’s not every day a company steps out…

MITRE CVE Program in Jeopardy

As a former advisory board member to the CVE/OVAL initiatives, I’m sounding the alarm: MITRE has confirmed that funding for the CVE and CWE programs will expire on April 16,…

TOP 100 IN CYBERSECURITY

Top InfoSec Innovators Awards for 2026 now open…

X

Stay Informed. Stay Secure. Read the Latest Cyber Defense eMag

X