Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News & Commentary

Latest Content tagged with Edge Articles
Page 1 / 2   >   >>
This is Not Your Fathers Ransomware
Feature  |  4/3/2020  | 
Ransomware operators are aiming for bigger targets and hitting below the belt. With doxing and extortion threats added to the mix, ransomware is evolving into something even more sinister.
Name That Toon: The Devil You Know?
Feature  |  4/2/2020  | 
Feeling creative? Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card.
Untangling Third-Party Risk (and Fourth, and Fifth...)
Feature  |  3/30/2020  | 
Third parties bring critical products and services to your organization. They also bring risk that must be understood and managed.
How to Evict Attackers Living Off Your Land
Feature  |  3/26/2020  | 
As cyber defenses improve, adversaries are shifting to stealthy "living-off-the-land" attacks that use targets' own tools against them. Here are some tips to defend your turf.
Three Ways Your BEC Defense Is Failing & How to Do Better
Feature  |  3/23/2020  | 
Business email compromises cost the economy billions of dollars. Experts have advice on how to stop them from hitting you for millions at a pop.
Dark Reading Cybersecurity Crossword Puzzle
Feature  |  3/20/2020  | 
Here's a little something to snuggle up with if you're on lockdown.
Quantifying Cyber Risk: Why You Must & Where to Start
Feature  |  3/19/2020  | 
Quantifying cybersecurity risks can be a critical step in understanding those risks and getting executive support to address them.
Security Lessons We've Learned (So Far) from COVID-19
Feature  |  3/17/2020  | 
Takeaways about fighting new fires, securely enabling remote workforces, and human nature during difficult times.
Beyond Burnout: What Is Cybersecurity Doing to Us?
Feature  |  3/13/2020  | 
Infosec professionals may feel not only fatigued, but isolated, unwell, and unsafe. And the problem may hurt both them and the businesses they aim to protect.
A Lesson in Social Engineering
Feature  |  3/13/2020  | 
What kind of school project is this?
CASB 101: Why a Cloud Access Security Broker Matters
Feature  |  3/12/2020  | 
A CASB isn't a WAF, isn't an NGF, and isn't an SWG. So what is it, precisely, and why do you need one to go along with all the other letters? Read on for the answer.
Keys to Hiring Cybersecurity Pros When Certification Can't Help
Feature  |  3/10/2020  | 
There just aren't enough certified cybersecurity pros to go around -- and there likely never will be enough. So how do you fill out your cybersecurity team? Executives and hiring managers share their top tips on recognizing solid candidates.
Out at Sea, With No Way to Navigate: Admiral James Stavridis Talks Cybersecurity
Feature  |  3/6/2020  | 
The former Supreme Allied Commander of NATO gives Dark Reading his take on the greatest cyberthreats our nation and its businesses face today.
Poll: Strengthening Security ... by Easing Security?
Feature  |  3/5/2020  | 
If security measures were made easier for end users, would your organization be more secure?
The Perfect Travel Security Policy for a Globe-Trotting Laptop
Feature  |  3/4/2020  | 
There are many challenges to safely carrying data and equipment on international travels, but the right policy can make navigating the challenges easier and more successful.
With New SOL4Ce Lab, Purdue U. and DoE Set Sights on National Security
Feature  |  3/3/2020  | 
The cooperative research initiative brings together faculty and students to "focus on problems and cutting-edge ways to solve them."
Name That Toon: Holy Cow!
Feature  |  3/2/2020  | 
Feeling creative? Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card.
Tense Talk About Supply Chain Risk Yields Few Answers
Feature  |  2/27/2020  | 
RSA panelists locked horns over whether the ban preventing US government agencies from doing business with Huawei is unfairly singling out the Chinese telecom giant.
How to Prevent an AWS Cloud Bucket Data Leak
Feature  |  2/26/2020  | 
Misconfigured AWS buckets have led to huge data breaches. Following a handful of practices will help keep you from becoming the next news story.
Wendy Nather on How to Make Security 'Democratization' a Reality
Feature  |  2/25/2020  | 
Ahead of her keynote at the RSA Conference, Cisco's head of advisory CISOs outlines to Dark Reading a unique paradigm that asks security teams to stop fighting their users -- and start sharing control with them.
SSRF 101: How Server-Side Request Forgery Sneaks Past Your Web Apps
Feature  |  2/24/2020  | 
Server-side request forgery is a dangerous attack method that is also becoming an issue for the cloud. Here are some of the basics to help keep your Web server from turning against you.
10 Tough Questions CEOs Are Asking CISOs
Feature  |  2/20/2020  | 
CEOs today are prepared with better questions than 'Are we secure,' and chief information security officers had better be ready to answer.
The Road(s) to Riches
Feature  |  2/18/2020  | 
You could be making millions in just two years!
8 Things Users Do That Make Security Pros Miserable
Feature  |  2/18/2020  | 
When a user interacts with an enterprise system, the result can be productivity or disaster. Here are eight opportunities for the disaster side to win out over the productive.
Martin and Dorothie Hellman on Love, Crypto & Saving the World
Feature  |  2/15/2020  | 
Martin Hellman, co-creator of the Diffie-Hellman key exchange, and his wife of 53 years, Dorothie, talk about the current state of cryptography and what making peace at home taught them about making peace on Earth.
Coronavirus Raises New Business Continuity, Phishing Challenges for InfoSec
Feature  |  2/13/2020  | 
What happens when understaffed security teams at home and abroad are sequestered in physical quarantine zones?
Chaos & Order: The Keys to Quantum-Proof Encryption
Feature  |  2/12/2020  | 
The implications of chaos form the basis of a new approach to encryption that promises quantum-proof perfect secrecy. But first, your current crypto needs some tidying up.
From 1s & 0s to Wobbly Lines: The Radio Frequency (RF) Security Starter Guide
Feature  |  2/7/2020  | 
Although radio frequency energy (RF) communications are increasingly essential to modern wireless networking and IoT, the security of RF is notoriously lax.
Phishing Personified
Feature  |  2/6/2020  | 
What makes these scams so completely obvious in the physical form?
Poll: A Matter of Trust
Feature  |  2/6/2020  | 
Has working in the cybersecurity industry affected your ability to trust? Take the poll now.
What Is a Privileged Access Workstation (PAW)?
Ask The Experts  |  2/5/2020  | 
Ask the Experts -- about a technological game of keep-away that protects the most precious resources from the greatest dangers.
C-Level & Studying for the CISSP
Feature  |  2/3/2020  | 
One CTO tells us about his belated pursuit of a foundational infosecurity certification -- why he wanted it and what it took.
Name That Toon: Private (Button) Eye
Feature  |  1/31/2020  | 
Feeling creative? Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card.
AppSec Concerns Drove 61% of Businesses to Change Applications
Threat Monitor  |  1/31/2020  | 
Some have even left behind commercial software and migrated to open source or in-house homegrown applications. Continue for synopsis or read full research report.
The Y2K Boomerang: InfoSec Lessons Learned from a New Date-Fix Problem
Feature  |  1/20/2020  | 
We all make assumptions. They rarely turn out well. A new/old date problem offers a lesson in why that's so.
With International Tensions Flaring, Cyber-Risk Is Heating Up for All Businesses
Feature  |  1/16/2020  | 
Risks of nation-state attacks go beyond Iran, and the need for awareness and security don't stop at any national border.
How to Comprehend the Buzz About Honeypots
Feature  |  1/15/2020  | 
Honeypots are crucial tools for security researchers and security teams. Understanding what they are and what they can do can be critical for making them safe and useful for your organization.
How to Keep Security on Life Support After Software End-of-Life
Feature  |  1/14/2020  | 
It's the end of support this week for Windows 7 and Server 2008. But what if you truly can't migrate off software, even after security updates stop coming?
An Identity Management Spin on Shaggy's Hit Song
Feature  |  1/13/2020  | 
Wondering how this guy could be so clumsy? So is he.
6 Unique InfoSec Metrics CISOs Should Track in 2020
Feature  |  1/10/2020  | 
You might not find these measurements on a standard cybersecurity department checklist. But they can help evaluate risks you haven't even considered yet.
In App Development, Does No-Code Mean No Security?
Feature  |  1/8/2020  | 
No-code and low-code development platforms are part of application development, but there are keys to making sure that they don't leave security behind with traditional coding.
Car Hacking Hits the Streets
Feature  |  1/7/2020  | 
The top-three carmakers sell only connected vehicles in the United States and other manufacturers are catching up creating a massive opportunity for attacks, which black-hat hackers are not overlooking.
What Tools Will Find Misconfigurations in My AWS S3 Cloud Buckets?
Ask The Experts  |  1/6/2020  | 
Misconfigured cloud buckets leak sensitive data. Here's how to keep your Amazon Web Services (AWS) Simple Server Storage (S3) buckets secured.
The Edge Cartoon Caption Contest: Latest Winners, New Toon 'Like a Boss'
Feature  |  1/3/2020  | 
Feeling creative? Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card.
How Cybersecurity's Metrics of Misery Fail to Describe Cybercrime Pain
Feature  |  1/2/2020  | 
Dollars lost and data records exposed are valuable measurements, but the true pain of a cybersecurity incident goes far beyond that. We asked infosec pros how they put words to the pain they feel when their defenses fall apart.
Cybercrime's Most Lucrative Careers
Feature  |  12/31/2019  | 
Crime pays. Really well. Here's a look at just how much a cybercriminal can earn in a month.
6 CISO New Year's Resolutions for 2020
Feature  |  12/30/2019  | 
We asked chief information security officers how they plan to get their infosec departments in shape next year.
Poll Results: Security Pros Are Not Only Smart -- They're Generous, Too
Feature  |  12/27/2019  | 
Altruism is alive and well among Edge readers, who seek to share their security expertise with causes they care about.
How Can My Security Team Begin Future-Proofing for Quantum Computing?
Ask The Experts  |  12/27/2019  | 
Knowing where your digital certificates are is just the start.
Gauging the Cybersecurity Climate
Ask The Experts  |  12/27/2019  | 
Is climate change impacting your cybersecurity, cyber-risk, or cyber-incident response plans?
Page 1 / 2   >   >>


Name That Toon: The Devil You Know?
Flash Poll