Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News & Commentary

Latest Content tagged with Edge Articles
Page 1 / 2   >   >>
5 Signs Someone Might be Taking Advantage of Your Security Goodness
Feature  |  11/27/2020  | 
Not everyone in a security department is acting in good faith, and they'll do what they can to bypass those who do. Here's how to spot them.
How Ransomware Defense Is Evolving With Ransomware Attacks
Feature  |  11/24/2020  | 
As data exfiltration threats and bigger ransom requests become the norm, security professionals are advancing from the basic "keep good backups" advice.
How Industrial IoT Security Can Catch Up With OT/IT Convergence
Feature  |  11/20/2020  | 
Ransomware can easily make a connection between IT and OT already. How can blue teams do the same?
ISP Security: Do We Expect Too Much?
Feature  |  11/19/2020  | 
With so many people now connecting to business networks from home routers, ISP security takes on heightened importance. But is the security provided by ISPs good enough to be the only security SMBs and remote employees need?
An Inside Look at an Account Takeover
Feature  |  11/17/2020  | 
AI threat find: Phishing attack slips through email gateway and leads to large-scale compromise.
We Secured the Election. Now How Do We Secure Trust in Results?
Feature  |  11/12/2020  | 
Disinformation campaigns are now designed not only to influence how voters fill out their ballots, but also how confident they are in the entire process. How do legislators, media organizations, security professionals, and voters respond?
9 New Tactics to Spread Security Awareness
Feature  |  11/11/2020  | 
Employees are often your first line of security defense when the bad guys come calling -- providing your workers are properly trained. Security leaders share how they're raising awareness.
The Double-Edged Sword of Cybersecurity Insurance
Feature  |  11/10/2020  | 
With ransomware on the rise, more organizations are opting to purchase cyber insurance -- tipping off criminals about how much to demand for access back to pilfered systems and data.
Name That Toon: Masks and Manners
Feature  |  11/6/2020  | 
Feeling creative? Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card.
The Malware Threat Landscape
Feature  |  11/6/2020  | 
Download this report to learn about the real makeup of online threats, as reported by the defenders who see them every day.
Bug Bounty Hunters' Pro Tips on Chasing Vulns & Money
Feature  |  11/5/2020  | 
From meditation to the right mindset, seasoned vulnerability researchers give their advice on how to maximize bug bounty profits and avoid burnout.
9 Cyber Disaster-Recovery Planning Tips for a Disaster-Prone Time
Feature  |  11/3/2020  | 
This year has been the ultimate test of business resilience, and if anything is now clear, it's this: It's time for security pros to rewrite their playbooks in preparation for a more dangerous wave of attacks.
Why Defense, Not Offense, Will Determine Global Cyber Powers
Feature  |  10/29/2020  | 
Darktrace director of strategic threat Marcus Fowler explains what to expect from nation-state attackers in the months to come -- and why kindergarten classes are a good model for solid cybersecurity.
How Data Breaches Affect the Enterprise (2020)
Feature  |  10/29/2020  | 
Thanks to COVID-19 and the sudden movement toward home workers, data breaches have become even more common in the past 12 months. Heres a look at the damage and how enterprises are responding.
Tracking Down the Web Trackers
Feature  |  10/28/2020  | 
Third-party Web trackers might be following your website visitors' every step. How can new tools like Blacklight help you stop them in their tracks?
Poll: Always Learning
Feature  |  10/27/2020  | 
Cybersecurity certifications remain as popular as ever. Any interest in expanding your skill set?
Teach Your Employees Well: How to Spot Smishing & Vishing Scams
Feature  |  10/26/2020  | 
One of the best ways to keep employees from falling victim to these social-engineering attacks is to teach them the signs.
Cybercriminals Could be Coming After Your Coffee
Feature  |  10/23/2020  | 
Researchers show no IoT device is too small to fall victim to ransomware techniques.
8 New and Hot Cybersecurity Certifications for 2020
Feature  |  10/22/2020  | 
While the usual security certs remain popular, interest in privacy skills and cloud experience are pushing new credentials into the market.
How AI Will Supercharge Spear-Phishing
Feature  |  10/21/2020  | 
To keep pace with intelligent, unpredictable threats, cybersecurity will have to adopt an intelligent security of its own.
A Swift Reminder About Cybersecurity
Feature  |  10/19/2020  | 
The hackers gonna crack, crack, crack, crack, crack ...
Expert Tips to Keep WordPress Safe
Feature  |  10/19/2020  | 
The most widely used content management system on the Web relies heavily on plug-ins and add-on software -- and that requires rigorous security measures at every level.
An Uncommon 20 Years of Commonly Enumerating Vulns
Feature  |  10/16/2020  | 
Larry Cashdollar, a researcher with more than 300 CVEs to his credit, looks back at his favorite vulnerabilities (and being the only individual CNA on Mitre's list).
What's Really Happening in Infosec Hiring Now?
Feature  |  10/14/2020  | 
As the pandemic continues, security teams still need help they can't get. But the "skills shortage" is only part of the story.
Phishing in Troubled Waters: 3 Ways Email Attacks May Impact Elections
Feature  |  10/13/2020  | 
The state of email defenses has a role to play in the US presidential election.
Emotet 101: How the Ransomware Works -- and Why It's So Darn Effective
Feature  |  10/9/2020  | 
In recent weeks, Emotet has emerged as the most common form of ransomware. Managing the risk involves starts with understanding the way it works.
Open Source Threat Intelligence Searches for Sustainable Communities
Feature  |  10/7/2020  | 
As long as a community is strong, so will be the intelligence it shares on open source feeds. But if that community breaks down ...
Rethinking Email Security in the Face of Fearware
Feature  |  10/6/2020  | 
E-mail messages preying on fear have ramped up since the COVID-19 outbreak, raising questions about security's reliance on historical data about past attacks to predict the future
'Virtual Cyber Carnival' Kicks off Cybersecurity Awareness Month
Feature  |  10/5/2020  | 
A new initiative will run throughout the month of October, invites the general public to play cybersecurity games (and win fabulous prizes).
Name That Toon: Castle in the Sky
Feature  |  10/2/2020  | 
Feeling creative? Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card.
CFAA 101: A Computer Fraud & Abuse Act Primer for InfoSec Pros
Feature  |  10/1/2020  | 
From WarGames, to Aaron Swartz, to bug bounties, to Van Buren, here's what cybersecurity researchers should know about the US's primary anti-hacking law before it gets its day in the Supreme Court.
Securing Slack: 5 Tips for Safer Messaging, Collaboration
Feature  |  9/29/2020  | 
Remote workers and scattered teams are relying on Slack more and more for messaging and collaboration. Here are a few extra tips for keeping data and systems more secure when using Slack.
RASP 101: Staying Safe With Runtime Application Self-Protection
Feature  |  9/25/2020  | 
The dream of RASP is to empower applications to protect themselves. How close do current implementations get to living the dream? Here's what to know.
Gaming Industry Hit With 10B+ Attacks In Past Two Years
Feature  |  9/23/2020  | 
Criminals scored big with credential stuffing and web app attacks, yet many gamers seem unfazed.
Making the Case for Medical Device Cybersecurity
Feature  |  9/23/2020  | 
With an increasing number of Internet-connected medical devices in use to manage diabetes, protection against a variety of wireless network attacks could very well be a matter of life and death for patients.
Can Schools Pass Their Biggest Cybersecurity Test Yet?
Feature  |  9/22/2020  | 
Understaffed, underfunded, and underequipped, IT teams in the K-12 sector face a slew of challenges amid remote and hybrid learning models. Here's where they can begin to protect their schools against cyberattacks.
A Hacker's Playlist
Feature  |  9/18/2020  | 
Nine security researchers share their favorite songs and genres.
Defending Against Deepfakes: From Tells to Crypto
Feature  |  9/17/2020  | 
Detecting doctored media has become tricky -- and risky -- business. Here's how organizations can better protect themselves from fake video, audio, and other forms of content.
h2c Smuggling: A New 'Devastating' Kind of HTTP Request
Feature  |  9/16/2020  | 
The newly discovered form of HTTP request smuggling could have widespread impact because any proxy can be affected, researchers say. Here's what infosec pros should know.
How IT Security Organizations are Attacking the Cybersecurity Problem
Feature  |  9/16/2020  | 
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
5 Security Lessons Humans Can Learn From Their Dogs
Feature  |  9/15/2020  | 
Without the right reinforcements, you could be barking at the moon.
3 Secure Moments: A Tranquil Trio of Security Haiku
Feature  |  9/11/2020  | 
Placid poems to quiet the infosec pro's harried mind. (Or placid, by infosec standards.)
Think You're Spending Enough on Security?
Feature  |  9/10/2020  | 
While the amount will vary from organization to organization, here are four ways for everyone to evaluate whether they're allocating the right amount of money and resources.
Gone in a Flash
Feature  |  9/9/2020  | 
Behold, the pitfalls of portable hardware.
Next-Gen Firewalls 101: Not Just a Buzzword
Feature  |  9/8/2020  | 
In a rare twist, "next-gen" isn't just marketing-speak when it comes to next-gen firewalls, which function differently than traditional gear and may enable you to replace a variety of devices.
Name That Toon: Mask Out
Feature  |  9/5/2020  | 
Feeling creative? Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card.
How Cybercriminals Take the Fun Out of Gaming
Feature  |  9/4/2020  | 
It's all fun and games until someone loses their V-Bucks, right? Here's how cyberattackers are cheating the gaming biz -- and winning big.
Ad Fraud: The Multibillion-Dollar Cybercrime CISOs Might Overlook
Feature  |  9/4/2020  | 
Marketing officers may have accepted ad fraud as a cost of doing business, but infosec pros take heed -- fraud can be a step to more significant attacks. Here's what to know and how to take action.
The Hidden Costs of Losing Security Talent
Feature  |  9/2/2020  | 
One person's exit can set off a chain of costly events.
Hypothesis: Cyber Attackers Are After Your Scientific Research
Feature  |  9/2/2020  | 
From COVID-19 treatment to academic studies, keeping research secure is more important than ever. The ResearchSOC at Indiana University intends to help.
Page 1 / 2   >   >>


   OVER THE EDGE
A Swift Reminder About Cybersecurity

Source: The Security Awareness Company

What security-related videos have made you laugh? Let us know! Add them to the Comments section or email us at [email protected].

Name That Toon: Masks and Manners
Flash Poll