Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News & Commentary

Latest Content tagged with Edge Ask the Experts
Could Work-From-Home Staff be Violating Privacy Laws During Conference Calls?
Ask The Experts  |  4/1/2020  | 
If you are lucky enough to be able to do your job from home right now, you should be aware of a few key things.
What Should I Do If Someone Is Impersonating My Company in a Phishing Campaign?
Ask The Experts  |  3/25/2020  | 
Two security awareness advocates from KnowBe4 provide some solid suggestions.
I Want to Work in Industrial IoT Security. What Lingo Do I Need to Know?
Ask The Experts  |  3/11/2020  | 
Should you happen to be in a meeting with an ICS vendor, here are some terms you will need to know so as to not be laughed out of the room.
What Should I Do About Vulnerabilities Without Fixes?
Ask The Experts  |  3/10/2020  | 
With better tools that identify potential threats even before developers address them, a new problem has arisen.
How Should I Answer a Nontech Exec Who Asks, 'How Secure Are We?'
Ask The Experts  |  2/26/2020  | 
Consider this your opportunity to educate.
What Are Some Basic Ways to Protect My Global Supply Chain?
Ask The Experts  |  2/11/2020  | 
Assessing supply chains is one of the more challenging third-party risk management endeavors organizations can take on.
What Is a Privileged Access Workstation (PAW)?
Ask The Experts  |  2/5/2020  | 
Ask the Experts -- about a technological game of keep-away that protects the most precious resources from the greatest dangers.
I'm an SMB. What Should I Watch for When Choosing Security Vendors?
Ask The Experts  |  1/30/2020  | 
SMBs need action, not just insight.
How Do I Get My Team Started with Container Security and Kubernetes?
Ask The Experts  |  1/28/2020  | 
The trick is to give your technical staff enough time to learn the new technology but also keep the pressure on to deliver. Here's a smart way to begin.
What Questions Should I Keep in Mind to Improve My Security Metrics?
Ask The Experts  |  1/13/2020  | 
If you can answer these six questions, you'll be off to a great start.
What Tools Will Find Misconfigurations in My AWS S3 Cloud Buckets?
Ask The Experts  |  1/6/2020  | 
Misconfigured cloud buckets leak sensitive data. Here's how to keep your Amazon Web Services (AWS) Simple Server Storage (S3) buckets secured.
How Can My Security Team Begin Future-Proofing for Quantum Computing?
Ask The Experts  |  12/27/2019  | 
Knowing where your digital certificates are is just the start.
Should I Have a Security Travel Policy to Protect Devices and Sensitive Data?
Ask The Experts  |  12/20/2019  | 
Mobile devices are lost or hacked while in transit far too frequently. Here are some steps to protect your business.
What Should I Look for in a Data Protection Officer?
Ask The Experts  |  12/16/2019  | 
The right candidate will possess the following skills.
I'm Setting Up a Bug-Bounty Program. What Should I be Thinking About?
Ask The Experts  |  11/14/2019  | 
Here are some important points to factor into your vulnerability disclosure policy.
How Can I Help My Team Manage Security Alerts?
Ask The Experts  |  11/7/2019  | 
Smart prioritization, great staff, and supportive tools are a good start.
Can I Get More Mileage From My Existing Security Tools?
Ask The Experts  |  10/14/2019  | 
Some points to consider before you break open your wallet.
How Can I Ensure Cyber Insurers Will Pay My Claim?
Ask The Experts  |  9/23/2019  | 
To get the best out of your policy, do more than just sign on the dotted line.
Any Advice for Assessing Third-Party Risk?
Ask The Experts  |  9/17/2019  | 
Here are five tips about what not to do when assessing the cyber-risk introduced by a third-party supplier.
What Are the First Signs of a Cloud Data Leak?
Ask The Experts  |  9/10/2019  | 
Most cloud data breaches leave only trace signs of malfeasance, so it can be tricky.
How Do I Handle Security Alert Fatigue?
Ask The Experts  |  8/27/2019  | 
Adding more security tools might add more security or just more headaches (and risk).
Which Security Metrics Should I Use?
Ask The Experts  |  8/22/2019  | 
Figuring that out actually begins with a broader question.
Is My Development Environment at Risk?
Ask The Experts  |  8/12/2019  | 
Development environments pose a few unique risks to the organization.
How Do I Monitor for Malicious Insiders?
Ask The Experts  |  8/5/2019  | 
Big picture: Think holistic, with appropriate levels of visibility into each stage of the insider threat kill chain.
How Can We Stop Ransomware From Spreading?
Ask The Experts  |  7/29/2019  | 
Here's how to stop them or at least limit the systems it can reach.
How Do I Know What Third-Party Components My Software Is Using?
Ask The Experts  |  7/22/2019  | 
Options include automated source scanners and commercial services.
My Company Is Looking at WAFs to Help Secure Traffic. Where Do We Start?
Ask The Experts  |  7/15/2019  | 
Above all else, think cloud-agnostic.
How Do I Get My Third-Party Suppliers to Meet My Security Standards?
Ask The Experts  |  7/1/2019  | 
Five security clauses to include in all of your supplier contracts.
How Do I Get Management to Buy into a SecDevOps Program?
Ask The Experts  |  7/1/2019  | 
More than anything, DevSecOps is a cultural change for many organizations.

Name That Toon: The Devil You Know?
Flash Poll