Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News & Commentary

Latest Content tagged with Edge Articles
Page 1 / 2   >   >>
As Offices Reopen, Hardware from Home Threatens Security
Feature  |  7/10/2020  | 
Devices out of sight for the past several months could spell trouble when employees bring them back to work.
Cybersecurity's Lament: There Are No Cooks in Space
Feature  |  7/3/2020  | 
Cybersecurity staff are on edge for the same reason that there are no cooks on the ISS: Organizations are carefully watching expenses for jobs that don't require dedicated team members.
Making Sense of EARN IT & LAED Bills' Implications for Crypto
Feature  |  7/2/2020  | 
After Senate Judiciary Committee pushes EARN IT Act a step closer to ratification, raising further concerns for privacy advocates, here's what to know.
Profile of the Post-Pandemic CISO
Feature  |  6/30/2020  | 
Projects that were high priorities before the COVID-19 outbreak have taken a back seat to new business needs. For security leaders that has meant new responsibilities that could very well stick around in the pandemic's aftermath.
5 New InfoSec Job Training Trends: What We're Studying During COVID-19
Feature  |  6/26/2020  | 
With the pandemic uprooting networks and upending careers, which security skills are hot -- and which are not?
How to Wring Every Last Drop Out of Your Security Budget
Feature  |  6/22/2020  | 
In the face of tighter budgets and lowered spending forecasts due to the pandemic, optimizing and improving the efficiency of security programs -- without sacrificing integrity -- has never been more important.
What Will Cybersecurity's 'New Normal' Look Like?
Feature  |  6/19/2020  | 
The coronavirus pandemic has forced changes for much of the business world, cybersecurity included. What can we expect going forward?
The Threat from the Internetand What Your Organization Can Do About It
Feature  |  6/19/2020  | 
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
What's Anonymous Up to Now?
Feature  |  6/17/2020  | 
The hacker group recently took credit for two high-profile incidents -- but its actions aren't quite the same as they once were, some say.
Inside Stealthworker: How It Compromises WordPress, Step-by-Step
Feature  |  6/12/2020  | 
A new wave of attacks using old malware is threatening WordPress sites that don't have strong password policies.
Asset Management Mess? How to Get Organized
Feature  |  6/10/2020  | 
Hardware and software deployments all over the place due to the pandemic scramble? Here are the essential steps to ensure you can find what you need -- and secure it.
Name That Toon: Sign of the Tides
Feature  |  6/5/2020  | 
Feeling creative? Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card.
RATs 101: The Grimy Trojans That Scurry Through Remote Access Pipes
Feature  |  6/3/2020  | 
Remote Access Trojans (RATs) can be the beginning of very bad things on your network or workstations.
10 Tips for Maintaining Information Security During Layoffs
Feature  |  6/2/2020  | 
Insider cyberthreats are always an issue during layoffs -- but with record numbers of home-office workers heading for the unemployment line, it has never been harder to maintain cybersecurity during offboarding.
All Links Are Safe ... Right?
Feature  |  5/29/2020  | 
Today is a perfect day for a security breach.
Security 101: SQL Injection
Feature  |  5/27/2020  | 
A carefully crafted attack can convince a database to reveal all its secrets. Understanding the basics of what the attack looks like and how to protect against it can go a long way toward limiting the threat.
5 Tips for Fighting Credential Stuffing Attacks
Feature  |  5/22/2020  | 
With stolen credentials an easy find online, what are some measures to put in place to keep hackers from breaking into secure accounts?
Dark Reading Edge Cybersecurity Crossword Puzzle, May 22th
Ask The Experts  |  5/22/2020  | 
Have a hard time coming up with the answers to these puzzle questions? We know a great place to look for more clues...
The Entertainment Biz Is Changing, but the Cybersecurity Script Is One We've Read Before
Feature  |  5/15/2020  | 
Several A-list celebrities have found themselves at the center of a ransomware attack -- and it's certainly not the first time hackers have gone after them or the entertainment industry. What are security pros doing wrong?
Biometrics in the Great Beyond
Feature  |  5/13/2020  | 
A thumbprint may be a good authentication factor for the living, but are you prepared to access mission-critical data and devices after an employee's death?
Cybersecurity Home School: Garfield Teaches Security
Feature  |  5/7/2020  | 
The famous cartoon cat can help kids ages 6 to 11 learn to be more secure when they're online.
Post-Pandemic Presentation Plans
Feature  |  5/5/2020  | 
Coming to a conference near you -- who knows when.
How InfoSec Pros Can Help Healthcare During the Coronavirus Pandemic
Feature  |  5/4/2020  | 
Security pros are banding together to ensure healthcare facilities can focus on saving lives instead of defending against cyber attacks. Here are a few places you can volunteer your services.
Name That Toon: The Lights Are On ...
Feature  |  5/1/2020  | 
Feeling creative? Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card.
User-Friendly Cybersecurity: Is a Better UX the Key to a Better Defense?
Feature  |  4/30/2020  | 
Frictionless security, improved interfaces, and more usable design may improve the efficacy of security tools and features (and make life easier for users and infosec pros alike). So why has there been so much resistance?
Election Security in the Age of Social Distancing
Feature  |  4/29/2020  | 
Although the controversial option of voting by mobile app is one pressing consideration, cybersecurity experts agree that older issues need to be resolved before November 3.
Will the Pandemic Complicate Cyber Insurance Claims?
Ask The Experts  |  4/27/2020  | 
While quarantined workers are keeping safe at home, they could be jeopardizing your insurance policy.
5 Ways to Prove Security's Worth in the Age of COVID-19
Feature  |  4/23/2020  | 
Tightened budgets are placing jobs at risk, but security pros say they're armed with ways to demonstrate that what they're doing merits keeping them employed.
Learning from the Honeypot: A Researcher and a Duplicitous Docker Image
Feature  |  4/22/2020  | 
When Larry Cashdollar set up a honeypot in a Docker image, he found behavior that was more enlightening than he had imagined.
Poll: Worried About Losing Your Job?
Feature  |  4/22/2020  | 
With the unemployment rate surging due to COVID-19, are you concerned your job is in jeopardy?
Cybersecurity Home-School: The Robot Project
Feature  |  4/17/2020  | 
This fun project can teach your homebound children and teens about cybersecurity (and keep them occupied for at least a little while).
Which InfoSec Jobs Will Best Survive a Recession?
Feature  |  4/15/2020  | 
With COVID-19 making a mess of the global economy, companies are seeking to cut corners - and some boardrooms still see security as a "cost center." Are infosec careers vulnerable now?
When All Behavior Is Abnormal, How Do We Detect Anomalies?
Feature  |  4/10/2020  | 
Identifying normal behavior baselines is essential to behavior-based authentication. However, with COVID-19 upending all aspects of life, is it possible to build baselines and measure normal patterns when nothing at all seems normal?
Feline Secure?
Feature  |  4/8/2020  | 
When there's a will, there's a way.
The Edge Names 'Holy Cow' Cartoon Caption Winners
Feature  |  4/7/2020  | 
What can cows possibly have to do with cybersecurity?
How Do I Make Sure My Work-From-Home Users Install Updates?
Ask The Experts  |  4/7/2020  | 
Most enterprise endpoint solutions will support policies to enforce recommended updates.
5 Soothing Security Products We Wish Existed
Feature  |  4/3/2020  | 
Maybe security alert fatigue wouldn't be so bad if the alerts themselves delivered less stress and more aromatherapy.
This Is Not Your Father's Ransomware
Feature  |  4/3/2020  | 
Ransomware operators are aiming for bigger targets and hitting below the belt. With doxing and extortion threats added to the mix, ransomware is evolving into something even more sinister.
Name That Toon: The Devil You Know?
Feature  |  4/2/2020  | 
Feeling creative? Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card.
Untangling Third-Party Risk (and Fourth, and Fifth...)
Feature  |  3/30/2020  | 
Third parties bring critical products and services to your organization. They also bring risk that must be understood and managed.
How to Evict Attackers Living Off Your Land
Feature  |  3/26/2020  | 
As cyber defenses improve, adversaries are shifting to stealthy "living-off-the-land" attacks that use targets' own tools against them. Here are some tips to defend your turf.
Three Ways Your BEC Defense Is Failing & How to Do Better
Feature  |  3/23/2020  | 
Business email compromises cost the economy billions of dollars. Experts have advice on how to stop them from hitting you for millions at a pop.
Dark Reading Cybersecurity Crossword Puzzle
Feature  |  3/20/2020  | 
Here's a little something to snuggle up with if you're on lockdown.
Quantifying Cyber Risk: Why You Must & Where to Start
Feature  |  3/19/2020  | 
Quantifying cybersecurity risks can be a critical step in understanding those risks and getting executive support to address them.
Security Lessons We've Learned (So Far) from COVID-19
Feature  |  3/17/2020  | 
Takeaways about fighting new fires, securely enabling remote workforces, and human nature during difficult times.
Beyond Burnout: What Is Cybersecurity Doing to Us?
Feature  |  3/13/2020  | 
Infosec professionals may feel not only fatigued, but isolated, unwell, and unsafe. And the problem may hurt both them and the businesses they aim to protect.
A Lesson in Social Engineering
Feature  |  3/13/2020  | 
What kind of school project is this?
CASB 101: Why a Cloud Access Security Broker Matters
Feature  |  3/12/2020  | 
A CASB isn't a WAF, isn't an NGF, and isn't an SWG. So what is it, precisely, and why do you need one to go along with all the other letters? Read on for the answer.
Keys to Hiring Cybersecurity Pros When Certification Can't Help
Feature  |  3/10/2020  | 
There just aren't enough certified cybersecurity pros to go around -- and there likely never will be enough. So how do you fill out your cybersecurity team? Executives and hiring managers share their top tips on recognizing solid candidates.
Out at Sea, With No Way to Navigate: Admiral James Stavridis Talks Cybersecurity
Feature  |  3/6/2020  | 
The former Supreme Allied Commander of NATO gives Dark Reading his take on the greatest cyberthreats our nation and its businesses face today.
Page 1 / 2   >   >>


   OVER THE EDGE
All Links Are Safe ... Right?

Source: Mimecast

What security-related videos have made you laugh? Let us know! Add them to the Comments section or email us at [email protected].

Name That Toon: Tough Times, Tough Measures
Latest Comment: Wear a mask, please!
Flash Poll