informa
/
Cybersecurity In-Depth

Edge Articles

In-Depth feature articles, analysis, and commentary on cybersecurity trends and best practices.

Name That Edge Toon: Good Heavens!
Feeling creative? Come up with a clever caption, and our panel of experts will reward the winner with a $25 Amazon gift ...
August 03, 2021
Feeling creative? Come up with a clever caption, and our panel of experts will reward the winner with a $25 Amazon gift ...
by John Klossner, Cartoonist
August 03, 2021
1 min read
Article
5 Key Questions When Evaluating Software Supply Chain Security
Knowing what to ask a potential supplier can minimize risks associated with third-party software vulnerabilities and bre...
August 02, 2021
Knowing what to ask a potential supplier can minimize risks associated with third-party software vulnerabilities and bre...
by Jai Vijayan, Contributing Writer
August 02, 2021
7 min read
Article
Inside the Famed Black Hat NOC
Network operations center managers Bart Stump and Neil Wyler (aka Grifter) again head up the show network, but with a ne...
July 30, 2021
Network operations center managers Bart Stump and Neil Wyler (aka Grifter) again head up the show network, but with a ne...
by Kelly Jackson Higgins, Executive Editor
July 30, 2021
6 min read
Article
101: Why BGP Hijacking Just Won't Die
A look at the dangers of attacks on the Internet's Border Gateway Protocol and what ISPs and enterprises can do about th...
July 28, 2021
A look at the dangers of attacks on the Internet's Border Gateway Protocol and what ISPs and enterprises can do about th...
by Seth Rosenblatt, Contributing Writer
July 28, 2021
8 min read
Article
When Software Updates Get Hacked
Darned if you do, darned if you don't: Software fixes have become extensively automated, which works when software suppl...
July 26, 2021
Darned if you do, darned if you don't: Software fixes have become extensively automated, which works when software suppl...
by Robert Lemos, Contributing Writer
July 26, 2021
6 min read
Article
How to Secure Your Cryptocurrency Wallet
With your investments in a digital wallet, under your control, you are the sole owner and can have the peace of mind tha...
July 22, 2021
With your investments in a digital wallet, under your control, you are the sole owner and can have the peace of mind tha...
by Rui Maximo, Cybersec Entrepreneur
July 22, 2021
5 min read
Article
Top Security Leaders Share Management Tips, Lessons, and Stories
A panel of experts from Microsoft, Twitter, Cisco, and MongoDB share their thoughts on non-technical CISOs, managing thr...
July 21, 2021
A panel of experts from Microsoft, Twitter, Cisco, and MongoDB share their thoughts on non-technical CISOs, managing thr...
by Kelly Sheridan, Senior Editor
July 21, 2021
8 min read
Article
How Gaming Attack Data Aids Defenders Across Industries
Web application attacks against the video game industry quadrupled in 2020 compared to the previous year, but companies ...
July 19, 2021
Web application attacks against the video game industry quadrupled in 2020 compared to the previous year, but companies ...
by Robert Lemos, Contributing Writer
July 19, 2021
6 min read
Article
When Ransomware Comes to (Your) Town
While steps for defending against a ransomware attack vary based on the size of the government entity and the resources ...
July 19, 2021
While steps for defending against a ransomware attack vary based on the size of the government entity and the resources ...
by Derek Prall, Contributing Writer
July 19, 2021
7 min read
Article
How to Attract More Computer Science Grads to the Cybersecurity Field
With 465,000 cybersecurity job openings in the United States, why is recruiting so difficult? A recent college graduate ...
July 16, 2021
With 465,000 cybersecurity job openings in the United States, why is recruiting so difficult? A recent college graduate ...
by Biagio DeSimone, Enterprise Solution Architect, Aqua Security
July 16, 2021
5 min read
Article
10 Mistakes Businesses Make During Ransomware Response
Hit by ransomware? These missteps can take a bad scenario and make it even worse.
July 15, 2021
Hit by ransomware? These missteps can take a bad scenario and make it even worse.
by Joan Goodchild, Senior Editor
July 15, 2021
1 min read
Slideshow
Navigating Active Directory Security: Dangers and Defenses
Microsoft Active Directory, ubiquitous across enterprises, has long been a primary target for attackers seeking network ...
July 12, 2021
Microsoft Active Directory, ubiquitous across enterprises, has long been a primary target for attackers seeking network ...
by Kelly Sheridan, Senior Editor
July 12, 2021
9 min read
Article
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
The ElectroRAT Trojan attacker's success highlights the increasingly sophisticated nature of threats to cryptocurrency e...
July 09, 2021
The ElectroRAT Trojan attacker's success highlights the increasingly sophisticated nature of threats to cryptocurrency e...
by David Trepp, Partner in the IT Assurance Practice at BPM
July 09, 2021
5 min read
Article
The NSA's 'New' Mission: Get More Public With the Private Sector
The National Security Agency's gradual emergence from the shadows was "inevitable" in cybersecurity, says Vinnie Liu, co...
July 08, 2021
The National Security Agency's gradual emergence from the shadows was "inevitable" in cybersecurity, says Vinnie Liu, co...
by Kelly Jackson Higgins, Executive Editor
July 08, 2021
7 min read
Article
Security 101: The 'PrintNightmare' Flaw
A closer look at the printer software vulnerability - and what you can do about it.
July 07, 2021
A closer look at the printer software vulnerability - and what you can do about it.
by Jai Vijayan, Contributing Writer
July 07, 2021
4 min read
Article