Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News & Commentary

Latest Content tagged with Edge Articles
Page 1 / 2   >   >>
How Enterprises are Developing Secure Applications
 |  3/3/2021  | 
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Name That Edge Toon: In Hot Water
Feature  |  3/2/2021  | 
Feeling creative? Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card.
Cybercrime 'Help Wanted': Job Hunting on the Dark Web
Feature  |  3/1/2021  | 
How's your 'Probiv'? How about customer service? Here's how Dark Web forums connect cybercriminals looking for talent with those looking for work -- and which skills are hot right now.
'Nerd' Humor
Feature  |  2/26/2021  | 
Some jokes never get old.
The Edge Pro Tip: Fasten Your Seatbelts
Feature  |  2/26/2021  | 
An unprecedented 2020 has shaken up security leaders' usual list of must-have technologies for 2021. Where do they plan to spend next?
Securing Super Bowl LV
Feature  |  2/26/2021  | 
A peek at open XDR technology and defense that held up better than the Kansas City Chiefs.
Cartoon Caption Winner: Be Careful Who You Trust
Feature  |  2/24/2021  | 
And the winner of The Edge's February cartoon caption contest is ...
Security + Fraud Protection: Your One-Two Punch Against Cyberattacks
Feature  |  2/23/2021  | 
When siloed functions unite in the face of cyberthreats, organizations can continue, uninterrupted, along their paths to digital transformation.
The Edge Pro Tip: Say What You Know
Feature  |  2/18/2021  | 
During the immediate period following a breach, it's vital to move fast but not trip over yourself.
Breach Etiquette: How to Mind Your Manners When It Matters
Feature  |  2/17/2021  | 
Panic-stricken as you may be in the face of a cyberattack, keeping calm and, perhaps most importantly, responding appropriately are critical to limiting the damage.
Fighting Fileless Malware, Part 3: Mitigations
Feature  |  2/16/2021  | 
Attackers can dodge the countermeasures you employ against fileless malware. So how do you mitigate the damage?
Unemployment Fraud: As If Being Out of Work Wasn't Bad Enough
Feature  |  2/11/2021  | 
With the pandemic as a backdrop, cybercriminals have recognized an unprecedented opportunity to steer billions of dollars in unemployment claims into the own accounts.
Fighting Fileless Malware, Part 2: Countermeasures
Feature  |  2/9/2021  | 
Why do fileless attacks persist? Let's break down the strengths and weaknesses of the existing mitigations.
The Edge Pro Tip: Don't Doubt Yourself
Feature  |  2/5/2021  | 
The Edge asked seasoned security pros what they wish they had known when they first got into the field.
AI and APIs: The A+ Answers to Keeping Data Secure and Private
Feature  |  2/5/2021  | 
Many security leaders view regulations and internal processes designed to manage and secure data as red tape that hampers innovation. Nothing could be further from the truth.
What I Wish I Knew at the Start of My InfoSec Career
Feature  |  2/3/2021  | 
Security pros identify lessons learned that impact how they view infosec today.
Fighting Fileless Malware, Part 1: What Is It?
Feature  |  2/2/2021  | 
Despite multiple layers of protection, fileless malware cyberattacks remain rampant and difficult to defeat. In this, the first of The Edge's three-part series about the cyberthreat and how to fight back, you'll learn what fileless malware is and why it's so dangerous.
Edge Poll: Hook, Line, and Sinker
Feature  |  2/1/2021  | 
How confident are you in your security team's ability to protect your organization from phishing?
Name That Edge Toon: Be Careful Who You Trust
Feature  |  2/1/2021  | 
Feeling creative? Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card.
FBI Encounters: Reporting an Insider Security Incident to the Feds
Feature  |  1/29/2021  | 
Most insider incidents don't get reported to the FBI due to fear of debilitating business disruptions, public embarrassment, and screeching vans skidding into the parking lot to confiscate servers. But is that reality?
Building Your Personal Privacy Risk Tolerance Profile
Feature  |  1/28/2021  | 
Even today, on Data Privacy Day, privacy professionals give you permission to admit you actually love targeted ads.
Cartoon Caption Winner: Before I Go ...
Feature  |  1/26/2021  | 
And the winner of The Edge's January cartoon caption contest is ...
Learn SAML: The Language You Don't Know You're Already Speaking
Feature  |  1/26/2021  | 
Security Assertion Markup Language, a protocol most people use daily to log into applications, makes authentication easier for both admins and users. Here's what you need to know about SAML (and what it has to do with "GoldenSAML").
Comparing Different AI Approaches to Email Security
Feature  |  1/25/2021  | 
There's a big difference between those that study 'known bads' and those that self-learn what is 'normal' and what isn't.
How Cybersecurity Newbs Can Start Out on the Right Foot
Feature  |  1/22/2021  | 
Cybersecurity experts share their savvy tips and useful resources for infosec hopefuls.
Hacker Pig Latin: A Base64 Primer for Security Analysts
Feature  |  1/21/2021  | 
The Base64 encoding scheme is often used to hide the plaintext elements in the early stages of an attack that can't be concealed under the veil of encryption. Here's how to see through its tricks.
4 Intriguing Email Attacks Detected by AI in 2020
Feature  |  1/19/2021  | 
Here's to the sneakiest of the sneaky. These clever phishing messages -- that standard validation measures often missed -- deserve proper dishonor. (Sponsored)
Name That Toon: Before I Go ...
Feature  |  1/15/2021  | 
Feeling creative? Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card.
These Kids Are All Right
Feature  |  1/15/2021  | 
Faculty and students at the William E. Doar School for the Performing Arts in Washington, D.C. created "Cyberspace," a rap song about online safety as part of the NSA's national STOP. THINK. CONNECT. campaign back in 2012. Wonder how many went into security.
Understanding TCP/IP Stack Vulnerabilities in the IoT
Feature  |  1/13/2021  | 
Internet of Things devices are highly susceptible to attacks, breaches, and flaws emanating from issues within the TCP/IP network communications architecture. Here's an overview of what you need to know to mitigate risks.
Cartoon: Shakin' It Up at the Office
Feature  |  1/8/2021  | 
And the winner of our December cartoon caption contest is ...
How the Shady Zero-Day Sales Game Is Evolving
Feature  |  1/7/2021  | 
Zero-day vulns are cold, while access-as-a-service is hot. Here's how black market (and gray market) deals go down.
Friction Affliction: How to Balance Security With User Experience
Feature  |  1/6/2021  | 
There's a fine line between protecting against suspicious, malicious, or unwanted activity and making users jump through hoops to prove themselves.
20 for 2020: The Edge's Top Articles of the Year
Feature  |  12/31/2020  | 
Variety is the spice of life, and it's also the perfect analogy for the article topics that resonated most with Edge readers this past year.
Security Pros Reflect on 2020
Feature  |  12/29/2020  | 
Eight cybersecurity leaders go deep on their most valuable (and very human) takeaways from a year like no other we've known.
Homomorphic Encryption: The 'Golden Age' of Cryptography
Feature  |  12/28/2020  | 
The ability to perform complex calculations on encrypted data promises a new level of privacy and data security for companies in the public and private sectors. So when can they get started?
Delivering Santa from Third-Party Risk
Feature  |  12/24/2020  | 
2020 has made even St. Nick susceptible to the risks associated with the coronavirus pandemic. Fortunately, cybersecurity experts are ready to help the merry old elf with advice on reducing risks to his global operations.
5 Email Threat Predictions for 2021
Feature  |  12/22/2020  | 
As domains get cheaper, account takeovers get easier, and cloud computing usage expands, email-borne attacks will take advantage.
7 Infamous Moments in Adobe Flash's Security History
Feature  |  12/21/2020  | 
End-of-life is here: Adobe's support for Flash is gone as of Jan. 1. Here's what we won't miss about the multimedia software platform.
XDR 101: What's the Big Deal About Extended Detection & Response?
Feature  |  12/17/2020  | 
Extended Detection and Response (XDR) could be the security management technology of your dreams...or not. What makes this technical 'evolution' so interesting to so many companies?
Why Secure Email Gateways Rewrite Links (and Why They Shouldn't)
Feature  |  12/16/2020  | 
Redirecting a user to a trusted server buys a secure email gateway company some time while it decides whether a URL is malicious -- but there are avoidable drawbacks to this approach.
2021 Security Budgets: 6 Top Priorities, New Realities
Feature  |  12/14/2020  | 
An unprecedented 2020 has shaken up security leaders' usual list of must-have technologies. What's on the horizon? They share with us their spending plans for 2021.
'Tis the Season to Confront Third-Party Risk
Feature  |  12/11/2020  | 
On any given day it's hard to ensure that outside companies and individuals adhere to an organization's security practices and policies. But when it's the holidays and, oh, a global pandemic, companies need to be extra vigilant.
51% of Edge Readers Plan to Pursue New Cybersecurity Certification in 2021
Feature  |  12/10/2020  | 
Demands of the "new normal" won't stop the majority of poll-takers from mastering new skills.
Poll: Endpoint Agita
Feature  |  12/10/2020  | 
What are your most significant endpoint security concerns?
10 Ways Device Identifiers Can Spot a Cybercriminal
Feature  |  12/9/2020  | 
Device IDs, which are assigned to mobile devices to distinguish one from another, can help organizations flag fraud, cyberattacks, and other suspicious activities.
The Magic Behind the Magic
Feature  |  12/7/2020  | 
And oldie but goodie and still pretty truey.
Name That Toon: Winter Forecast
Feature  |  12/7/2020  | 
Feeling creative? Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card.
BECs and EACs: What's the Difference?
Feature  |  12/4/2020  | 
Email accounts are common targets for attack. Understanding how attack types differ is critical for successful defense.
Assessing Cybersecurity Risk in Today's Enterprises
Feature  |  12/4/2020  | 
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Page 1 / 2   >   >>


Cartoon Caption Winner: Be Careful Who You Trust
Flash Poll