Cybersecurity Smackdown: What Side Are You On?
Analytics vs. Encryption. Prevention vs. Detection. Machine Learning: Promise or Hype? The Firewall: Dead or Still Breathing? The sharpest minds in the security industry debate some of the industry's most contentious issues.
How (And Why) Hackers Target Your Business
Don’t miss this inside look by a trio of experts from industry and law enforcement during Dark Reading's virtual event, Cybersecurity: The Business View. Now available On-Demand.
Measuring Real Risk: The Business View
Dark Reading's Jan. 26 virtual event on the business perspective of cybersecurity will feature a panel discussion on how to measure risk and the cost of a security program.
2015: The Year Of 'Attacks on Trust'
Nine attacks that leveraged stolen, compromised, or unprotected cryptographic keys and digital certificates show how easy it is for cybercriminals to bypass security controls and hide their actions.
A Hidden Insider Threat: Visual Hackers
Ponemon experiment shows how low-tech white-hat hackers, posing as temps, captured information from exposed documents and computer screens in nearly nine out of ten attempts.
‘Re-innovating’ Static Analysis: 4 Steps
Before we pronounce the death of static analysis, let’s raise the bar with a modern framework that keeps pace with the complexity and size found in today’s software.