Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News & Commentary

Latest Content tagged with Edge Articles
Planning a Bug Bounty Program? Follow Shopify's Example
Edge-DRsplash-10-edge-articles  |  7/22/2019  | 
Four years, $1 million in payouts, and the identification of 950 bugs later, Shopify provides an excellent example for organizations looking to launch their own programs.
Security Considerations in a BYOD Culture
Edge-DRsplash-10-edge-articles  |  7/19/2019  | 
The 'bring your own device' movement has put security pros on high alert for a new breed of predator who is on the hunt to find ways to exploit the ever-expanding attack surface.
Rapper Who is Very Concerned with Password Security
Edge-DRsplash-10-edge-articles  |  7/18/2019  | 
The Truth About Vulnerabilities in Open Source Code
Edge-DRsplash-10-edge-articles  |  7/18/2019  | 
Turns out the problem isn't with the code itself, experts say.
The 10 Essentials of Infosec Forensics
Slideshows  |  7/17/2019  | 
Whether it's your first investigation or 500th, review the basics of IT forensics to streamline and simplify your discovery.
GDPR: The Good, the Bad, and the Uncertain
Edge-DRsplash-10-edge-articles  |  7/16/2019  | 
One year post-GDPR implementation it's time to ask the tough question of whether companies are celebrating or cursing these consumer privacy mandates.
Frank Taylor: Better Processes Lead to Tighter Security
Edge-DRsplash-10-edge-articles  |  7/15/2019  | 
If the now-retired Air Force Brigadier General and first-ever GE CSO ever got the memo about career specialization and 'nichey' expertise, he apparently forgot to read it.
Back to Basics with Log Management, SIEMs & MSSPs
Edge-DRsplash-10-edge-articles  |  7/12/2019  | 
Not fully clear about why your organization collects any (or all) log data? Experts offer their tips on making better use of log data and alerts to improve your security profile.
Theres a Security Incident in the Cloud: Whos Responsible?
Edge-DRsplash-10-edge-articles  |  7/11/2019  | 
It's a valid question, and one many enterprises remain unsure of amid a mass migration that has transformed business over the past few years.
To Pay or Not To Pay? That Is the (Ransomware) Question
Edge-DRsplash-10-edge-articles  |  7/9/2019  | 
Businesses around the globe continue to fall victim to ransomware. For some, choosing to pay the ransom is actually a cost savings.
Burned Out?
Edge Flash Poll  |  7/1/2019  | 
If Movie Hackers Were More Like Real IT Guys
Edge-DRsplash-10-edge-articles  |  7/1/2019  | 
No one uses their keyboard that much.
Contest: Name That Toon
Edge-DRsplash-10-edge-articles  |  7/1/2019  | 
About The Edge
Edge-DRsplash-10-edge-articles  |  7/1/2019  | 
Like a Sunday magazine in a daily newspaper, The Edge offers a variety of value-add content.
Too Many Tools? Tidy Up in 'KonMari' Style
Edge-DRsplash-10-edge-articles  |  7/1/2019  | 
You've no doubt heard about Marie Kondo's method of decluttering the home. Turns out, it can help security pros tackle all of those security tools piling up around the organization.
Dark Reading Launches The Edge to Expand Security Coverage
Edge-DRsplash-10-edge-articles  |  7/1/2019  | 
New 'Sunday magazine' section offers deeper insights on cyber defense, educational materials, and human interest stories.
Staying Ahead of the Bot Landscape
Edge-DRsplash-10-edge-articles  |  7/1/2019  | 
Thinking of the bot landscape as homogeneous paints an overly simplistic picture.
What Cyber Skills Shortage?
Commentary  |  6/4/2019  | 
Employers can solve the skills gap by first recognizing that there isn't an archetypal "cybersecurity job" in the same way that there isn't an archetypal "automotive job." Heres how.
Threat Hunting 101: Not Mission Impossible for the Resource-Challenged
Commentary  |  3/27/2019  | 
How small and medium-sized businesses can leverage native features of the operating system and freely available, high-quality hunting resources to overcome financial limitations.
Security 101: How Businesses and Schools Bridge the Talent Gap
News  |  12/20/2018  | 
Security experts share the skills companies are looking for, the skills students are learning, and how to best find talent you need.
2019 Attacker Playbook
Slideshows  |  12/14/2018  | 
Security pundits predict the ways that cybercriminals, nation-state actors, and other attackers will refine their tactics, techniques, and procedures in the coming year.
Deception: Honey vs. Real Environments
Commentary  |  12/12/2018  | 
A primer on choosing deception technology that will provide maximum efficacy without over-committing money, time and resources.
5 Steps to Success for New CISOs
Commentary  |  9/19/2018  | 
You've been hired to make an impact. These tips can help set you up for continued success.
DevOps Demystified: A Primer for Security Practitioners
Commentary  |  9/10/2018  | 
Key starting points for those still struggling to understand the concept.


Dark Reading's new section for features, threat data and in-depth perspectives
More about The Edge

Contest: Name That Toon
Flash Poll